Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <646171.98505.qm@web35301.mail.mud.yahoo.com>
Date: Fri, 5 Nov 2010 18:05:21 -0700 (PDT)
From: William <phoolon_devi@...oo.com>
To: john-users@...ts.openwall.com
Subject: Re: which john & options to use for Mac OS X 10.4+ salted SHA-1 using OSX 10.6?

Alexandar,

Thanks for responding.

1.  You're right: the .iso has the same password as the account I was using that I used the unshadow on, so I have the .iso, but the account has since been deleted, so it's from the account, but I need the pw for the .iso.

2.  > When i loaded it onto the MacMini, I had to dl Rosetta...
There was no error message, it just said "need to download Rosetta ok/no" so I hit "ok" and it did.  To be clear, the John pro I'm using I bought about 3 years ago.

3.  I tried "./john" on the 1.7.6 with no luck, but "john" worked on the 1.7.3.  Used to be I had to use "./john", but that was on my old PowerBook PPC running 10.4.

4.  The pw was 6 or 7 characters, all lower case, with either two or four numbers and one punctuation, either a * or a !, I can't remember which.   I found a text permutation generator:  http://mytexttools.com/Permutation-Generator.html
So I put in all the bits I've ever used before and came up with a wordlist that I used.

I actually created the pw to be uncrackable, so perhaps I did too good a job.  Yep, I'm a newbie, well, figuring stuff out, but thanks for the help.

-W




--- On Fri, 11/5/10, Solar Designer <solar@...nwall.com> wrote:

From: Solar Designer <solar@...nwall.com>
Subject: Re: [john-users] which john & options to use for Mac OS X 10.4+ salted SHA-1 using OSX 10.6?
To: john-users@...ts.openwall.com
Date: Friday, November 5, 2010, 5:09 AM

William,

On Thu, Nov 04, 2010 at 03:24:12PM -0700, William wrote:
> I'm trying to crack a old .iso of mine which I've forgotten 
> the pw for (really).  I dumped the file and its a Mac OS X 10.4+ salted 
> SHA-1 

This sounds weird to me.  How is that .iso password protected?  How did
you dump the file?  Are you sure you're cracking a password relevant to
the .iso, rather than some other password hash you have in the system?

> I've been running the john command against it for 7 days now.  What would be
>  the best way to crack this sucker?

It depends.  Please start by answering my questions above, if you don't
mind.  Also, please mention any info you can recall about your password -
its length (or a lengths range), character set, whether it was based on
dictionary word(s) or not, anything else of that kind.

> Should I use  the patched 1.7.6 jumbo 7 macosx universal 3?

You may use it, but it should not make a difference for your use,
compared to JtR Pro that you're already using.

> I bought the pro 1.7.3, is there a new one out?

Not yet.

> When i loaded it onto the MacMini, I had to dl Rosetta...

That's weird.  What made you arrive at the conclusion that you needed
Rosetta?  Did you receive some kind of error message?  I'd appreciate a
problem report against JtR Pro for that.

JtR Pro uses a Universal binary that should run on Intel Macs just fine
(as well as on PowerPC ones), without Rosetta.

> I've tried to get the 1.7.6 jumbo 7 running, but it's not working.  Keep getting
> "-bash: john: command not found"

This is addressed in the FAQ: you should be typing "./john" instead of
just "john".  JtR Pro avoids this problem by adding the correct
directory to the default search path, specifically for those who are new
to the Unix shell.

> different syntax on 1.7.6?

No, it's free & generic (requires skills) vs. Pro & OS-specific (easier
to use if you're new to this stuff).  (Yes, "Pro" is sort of misnamed...
but it has to be that way.)

> What's the best to use: --rules  or --single or what?

Initially, no options at all.  Just give "john" the file to crack.
Apparently, that's what you're doing already, and it did not crack the
password in 7 days.  If so, you may want to try customizing/focusing the
attack, for which you need to consider the information you can recall
about the password.  There's no general answer that a single option
would be better in all cases (if this were the case, that setting would
have been the default).

Also, please note that not all passwords are meant to be crackable (in a
reasonable amount of time).  This is why it makes sense for a system
administrator to detect and eliminate just the weak passwords (the
crackable ones).  If your lost password was a strong one and you don't
recall any sufficiently specific information about it, then it is quite
possible that it won't get cracked.

Once again, please start by confirming that you're in fact cracking what
you think you are.  It is quite possible that you are not.  It is the
first time I hear of an .iso file somehow being related to a Mac OS X
salted SHA-1 hash.

Best regards,

Alexander



      

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.