|
Message-ID: <CANO7a6z-k35ADzTc+ia5gyLfxD3NO4D4MbK9Yg80053obCrssw@mail.gmail.com> Date: Tue, 23 Feb 2016 08:25:39 +0100 From: Dhiru Kholia <dhiru.kholia@...il.com> To: john-users@...ts.openwall.com Subject: Re: current suggested/supported method for extracting hash from PDF files? On Mon, Feb 22, 2016 at 10:12 PM, Jerry Kemp <sec-acct.14@...x.us> wrote: > I have a password protected PDF file that I no longer have/remember the > password to, and this should be an ideal opportunity to learn another aspect > of John. > > If it matters, I'm using john 1.8.0 Jumbo-1 on Solaris. > > Reviewing my email archives, plus current documentation, I see at least 3 > possible options. > > Back in August 2012, it looks like we were using npdf2john , but this > appears that it is no longer available on github > > Get npdf2john (from https://github.com/halfgenius/npdf2john) and > run it on PDF file(s). > > From the /doc directory in 1.8.0 Jumbo-1, it is suggested to use pdfcrack as > a PDF file cracker. > > From the /run directory, It looks like I have pdf2john.py available > > Are there others? > > Wondering what the current preferred/suggested method of cracking PDF's is? https://github.com/magnumripper/JohnTheRipper/blob/bleeding-jumbo/doc/README-PDF I just added this help file to the repository. Additionally, I recommend using the latest code from our GitHub repository, https://github.com/magnumripper/JohnTheRipper Dhiru
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.