Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue, 27 Feb 2018 17:06:50 -0500
From: Ian Boyd <ibkid@...us.net>
To: john-users@...ts.openwall.com
Subject: Re: dmg file with lost password

Is this the information you are looking for regarding showing the full output?

[22:37:12] /Users/ianboyd/Downloads/john-1.8.0.9-jumbo-macosx_v3/run/john --format=dmg-opencl --single --session=/Users/ianboyd/.john/sessions/02-24-18-22-37-12 /Users/ianboyd/Desktop/Johnny files/dmgpass.lst
Device 1: Intel(R) Iris(TM) Graphics 6100
Using default input encoding: UTF-8
Loaded 1 password hash (dmg-opencl, Apple DMG [PBKDF2-SHA1 OpenCL 3DES/AES])
Will run 4 OpenMP threads
/.-------------------------------------
[22:38:35] /Users/ianboyd/Downloads/john-1.8.0.9-jumbo-macosx_v3/run/john --restore=/Users/ianboyd/.john/sessions/02-24-18-22-33-44
Loaded 1 password hash (dmg, Apple DMG [PBKDF2-SHA1 256/256 AVX2 8x 3DES/AES])
Will run 4 OpenMP threads
/.-.\.|./.-.\.|./.-.\.|./.-.\.|./.-.\.|./.Proceeding with single, rules:Single
.Press 'q' or Ctrl-C to abort, almost any other key for status
0g 0:00:02:05 22.65% 1/3 (ETA: 22:45:42) 0g/s 87.55p/s 87.55c/s 87.55C/s Users/users/ianboyd/desktop/files/information.dmgs
Proceeding with wordlist:/Users/ianboyd/Downloads/john-1.8.0.9-jumbo-macosx_v3/run/password.lst and rules:Wordlist
.Proceeding with incremental:ASCII

> On Feb 27, 2018, at 5:01 PM, Solar Designer <solar@...nwall.com> wrote:
> 
> On Tue, Feb 27, 2018 at 04:35:22PM -0500, Ian Boyd wrote:
>> I believe I did get Johnny to work using the dmgsjohn. file and chose the dmg for the file format in the drop down.
>> The program has currently been running for a total time of 2:17:48:33 and has worked through Single rule, Wordlist rule, and has been working on incremental rule for some time. But it's my understanding that incremental typically takes the longest time. Is this correct?
>> Can this process take a long time?
> 
> Yes, it can take forever, unless it cracks your password first.  To have
> a better chance of cracking the password, you'll need to focus the
> attack using whatever information about the password you can recall.
> 
> But first of all you should really want to "show us the full output from
> JtR (copy-paste from a Johnny window)".  Without that, we can't be
> confident you ran it correctly and that it is doing what it should be.
> By incorrect invocation, it is possible to have it spend a lot of time
> processing without it actually doing anything even remotely reasonable.
> 
> Another thing you might want to do is generate a test dmg file with an
> obviously very weak password and have JtR crack that.  This will serve
> to verify that you do things right and will show you what the output of
> a correctly running attack should look like.
> 
> Alexander

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.