|
Message-ID: <CAL7A2Dy=bAyvy7bZz1Gt+1oQM3O2EFdQvJ7cqR5YmDnMq-QKJQ@mail.gmail.com> Date: Thu, 4 Dec 2014 14:18:04 -0800 From: Danux <danuxx@...il.com> To: john-users@...ts.openwall.com Subject: Re: Cracking office documents Hmm, the doc hash sounds good, please share your tools/findings. On Dec 4, 2014 2:07 PM, "hmm" <loadtoad@...il.com> wrote: > I did it a few months ago on a 2007 doc. It wasn't easy. I used some tool > to do it. I would have to consult notes at work to confirm. I can find out > tomorrow. > On Dec 4, 2014 3:38 PM, "Dan Tentler" <dan@...nlabs.com> wrote: > > > how do you get the hash out of the doc? > > > > On 12/4/14 1:03 PM, hmm wrote: > > > I believe I am speaking about cracking the hash not the actual doc. > > > On Dec 4, 2014 2:44 PM, "Dan Tentler" <dan@...nlabs.com> wrote: > > > > > >> What format do they appear to be in? Do you have to manually specify a > > >> format? > > >> On 12/4/14 12:38 PM, hmm wrote: > > >>> I have has luck using the bleeding edge releases to crack office > docs. > > >>> On Dec 4, 2014 2:31 PM, "Dan Tentler" <dan@...nlabs.com> wrote: > > >>> > > >>>> Hey Guys! > > >>>> > > >>>> So some of you may have heard, attackers have been leaking gigs and > > >>>> gigs of sony data. Bad guys will be bad, but the good guys are > > >>>> dissecting every iota of these things for analysis purposes, > creating > > >>>> new dictionaries etc etc. > > >>>> > > >>>> Some of these files are password protected. I don't recall if jtr > does > > >>>> cracking of office document formats - I tried handing one to the the > > git > > >>>> version of john from maybe a week ago and it thinks the crypto is > > >>>> 'whirlpool'. > > >>>> > > >>>> Thoughts? > > >>>> > > >>>> -Dan > > >>>> > > >>>> > > >> > > > > >
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.