Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <91D201D5-EFB6-461B-8939-F8F00BF962A0@pair.com>
Date: Sun, 6 Apr 2014 23:46:53 -0700
From: Jeff Keller <jakeller@...r.com>
To: john-users@...ts.openwall.com
Cc: magnum <john.magnum@...hmail.com>
Subject: Re: Great News - photos recovered!

Yep, it worked!

"Cracked /Volumes/Time Machine/Jeff's 12-Core Mac Pro.sparsebundle/bands/0"

Thanks everyone!

Jeff

On Apr 5, 2014, at 1:10 PM, Michael Ledford <mledford@...il.com> wrote:

> Hi Jeff,
> 
> Congratulations! Did you happen to check to see if john was given the
> actual password that it shows as a positive result?
> 
> Cheers,
> Michael
> 
> 
> On Thu, Apr 3, 2014 at 12:36 AM, Jeff Keller <jakeller@...r.com> wrote:
> 
>> While diving through my file cabinet I found the password for my Time
>> Machine backup in a place where it should not have been!  So my backup,
>> complete with 15+ years of photos, has been saved!
>> 
>> I did use the style I described originally, just a pair of words that I
>> hadn't used before. If you have the hash file still and want to see if you
>> can crack it with an extra hint, let me know.
>> 
>> Thanks for everyone who tried to crack the password, and to magnum for
>> helping me get up and running.
>> 
>> Best,
>> Jeff
>> 
>> On Mar 8, 2014, at 12:43 PM, Jeff Keller <jakeller@...r.com> wrote:
>> 
>>> Thousands of my treasured photos are stuck on an encrypted sparsebundle
>> DMG file from a Time Machine backup. I've worked with magnum to gain
>> support for the format and extract the hash (thanks magnum!), but neither
>> of us have been able to get the password.
>>> 
>>> I'm offering $3000 (via Paypal) to whomever can crack the code so I can
>> retrieve the contents. I work for DPReview.com (world's largest digital
>> photography site, owned by Amazon) and formerly ran DCResource.com for 15
>> years, so I'm actual employed person who can pay the reward. My employer is
>> not involved in this project.
>>> 
>>> The password is NOT a random string of characters. It's likely common
>> words (which I've provided via the link below) with certain characters
>> swapped out. It's probably between 6-12 characters.
>>> 
>>> My common substitutions:
>>> 1 -> !
>>> O -> 0  (letter to number)
>>> two -> 2
>>> four -> 4
>>> 
>>> You can download the hash and some possible hint words at this link:
>>> [link dead]
>>> 
>>> Let me know if you have any questions. If anyone can crack this one
>> open, I will be forever in your debt!
>> 
>> 
>> ---
>> Jeff Keller
>> Senior Writer, Digital Photography Review
>> www.dpreview.com
>> 
>> 


---
Jeff Keller
Senior Writer, Digital Photography Review
www.dpreview.com


Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.