|
Message-ID: <loom.20140821T212023-172@post.gmane.org> Date: Thu, 21 Aug 2014 19:52:42 +0000 (UTC) From: Jasper <iteks@....com> To: john-users@...ts.openwall.com Subject: Need help cracking the hash output from dmg2john I am not a hacker/cracker, well the second is debatable since I am white. But please forgive my ignorance or lack of proper vernacular that you pros use. I am computer literate, done some web programming and network admin and I'm a quick learner. However, this cracking stuff is certainly not in my area of knowledge. Please help, I think I'm off to a good start already. Heres the deal. Forgot the pw of a secured DMG. I have a few ideas of some string combos. First, I used JTR and dmg2john to get a dmg.txt hash file. Now, I want to apply what I know of the pw to a wordlist dict and/or rules. I think it would be best to use a combinator attack, but I don't see how JTR allows the use of 2 lists. If JTR can do this please advise. If not, then it'd be great if I could generate a single list from the 2 lists that would normally be used as a combinator attack. Here's what I know so far: 1. There is a alpha word between 4 and 7 chars (I have some possibles in mind). 2. There is a separator between 1 and 3 chars (i.e. 1 char space containing a single number from 0-9 or 3 char spaces with space 1 and 3 containing "+" with a number ranging from 0-9 in the middle). 3. There is a final word between 4 and 6 chars (I have some possibles in mind). In theory the first wordset is in a wordlist-1.txt, the second wordset is in a wordlist-2.txt and the separator could be written as an incremental rule. I may be way off track and you all might be peeing your pants laughing, however, I just need your help. Tell me what to do or what you think should be done. Thanks in advance guys.
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.