Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAL7A2Dz6keq9PR2mhn2G3xiMmjz3tGS6eqHwULewu7nH+pEQTQ@mail.gmail.com>
Date: Mon, 6 Oct 2014 09:14:13 -0700
From: Danux <danuxx@...il.com>
To: john-users@...ts.openwall.com
Subject: Zip2john not working

Hi,

I recently downloaded the latest jumbo version *john-1.7.9-jumbo-7.tar.gz*:
and when trying to crack a file created with the latest version of Winzip
(18.5) for Windows 64-bit, john says it found 4 guesses and when printing
the cracked one via --show it displays the wrong one. Below the detailed
steps that I did, please advise if this is a bug. I was able to crack
passwords with other formats but not this. I am attaching the Winzip.zip
file.

A created a file 'wordlist' with the following words:

zephan

penangirow

!!!alex!!!             <----- ZIP password

3113618031

Create the zip2john hash file...

[r@xxx run]# ./zip2john Winzip.zip > winzip.hash

Winzip.zip->101.pdf is using AES encryption, extrafield_length is 11

Verify contents...

[r@xxx run]# cat winzip.hash

Winzip.zip:$zip$*0*3*c1892f8c9d3945d9b03abf230eea6bd7*1ca6

Run john on hash:

[r@xxx run]# ./john winzip.hash --wordlist=wordlist

Loaded 1 password hash (WinZip PBKDF2-HMAC-SHA-1 [32/64])

zephan           (Winzip.zip)

penangirow       (Winzip.zip)

!!!alex!!!       (Winzip.zip)

3113618031       (Winzip.zip)

guesses: 4  time: 0:00:00:00 DONE (Thu Oct  2 15:27:28 2014)  c/s: 5.95
trying: zephan

POT File:

[r@xxx run]# cat john.pot

$zip$*0*3*c1892f8c9d3945d9b03abf230eea6bd7*1ca6:zephan

$zip$*0*3*c1892f8c9d3945d9b03abf230eea6bd7*1ca6:penangirow

$zip$*0*3*c1892f8c9d3945d9b03abf230eea6bd7*1ca6:!!!alex!!!

$zip$*0*3*c1892f8c9d3945d9b03abf230eea6bd7*1ca6:3113618031
Printing result:

[r@xxx run]# ./john winzip.hash --show

Winzip.zip:3113618031            <---------Wrong Password


1 password hash cracked, 0 left

Thanks.

On Mon, Oct 6, 2014 at 7:50 AM, Dhiru Kholia <dhiru.kholia@...il.com> wrote:

> Hi,
>
> Latest JtR-jumbo now supports cracking NTP MD5 authentication hashes.
>
> https://github.com/magnumripper/JohnTheRipper
>
> $ ../run/ntp2john.py NTP_with_MD5_key_foobar.pcap > ntp-hash
>
> Sample .pcap can be downloaded from the http://wiki.wireshark.org/NTP
> page.
>
> $ ../run/john ntp-hash -w=wordlist.txt
> Loaded 1 password hash (dynamic_1016 [md5($s.$p) (long salt) 128/128 AVX
> 480x4x3])
> Will run 8 OpenMP threads
> Press 'q' or Ctrl-C to abort, almost any other key for status
> foobar           (1)
>
> $ OMP_NUM_THREADS=2 ../run/john --test --format=dynamic_1016
> Will run 2 OpenMP threads
> Benchmarking: dynamic_1016 [md5($s.$p) (long salt) 128/128 AVX 480x4x3]...
> (2xOMP)
> Many salts:     27463K c/s real, 13800K c/s virtual
> Only one salt:  20834K c/s real, 10417K c/s virtual
>
> Thanks Jim for the dynamic format :-)
>
> Dhiru
>



-- 
DanUx

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.