Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <CANO7a6z-k35ADzTc+ia5gyLfxD3NO4D4MbK9Yg80053obCrssw@mail.gmail.com>
Date: Tue, 23 Feb 2016 08:25:39 +0100
From: Dhiru Kholia <dhiru.kholia@...il.com>
To: john-users@...ts.openwall.com
Subject: Re: current suggested/supported method for extracting
 hash from PDF files?

On Mon, Feb 22, 2016 at 10:12 PM, Jerry Kemp <sec-acct.14@...x.us> wrote:
> I have a password protected PDF file that I no longer have/remember the
> password to, and this should be an ideal opportunity to learn another aspect
> of John.
>
> If it matters, I'm using john 1.8.0 Jumbo-1 on Solaris.
>
> Reviewing my email archives, plus current documentation, I see at least 3
> possible options.
>
> Back in August 2012, it looks like we were using npdf2john , but this
> appears that it is no longer available on github
>
> Get npdf2john (from https://github.com/halfgenius/npdf2john) and
> run it on PDF file(s).
>
> From the /doc directory in 1.8.0 Jumbo-1, it is suggested to use pdfcrack as
> a PDF file cracker.
>
> From the /run directory, It looks like I have pdf2john.py available
>
> Are there others?
>
> Wondering what the current preferred/suggested method of cracking PDF's is?

https://github.com/magnumripper/JohnTheRipper/blob/bleeding-jumbo/doc/README-PDF

I just added this help file to the repository.

Additionally, I recommend using the latest code from our GitHub repository,

https://github.com/magnumripper/JohnTheRipper

Dhiru

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.