Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <CANWtx01Q9K2TsMywfMRx0FTza-_Efo1O5WDozd74OqaPCwU6bw@mail.gmail.com>
Date: Thu, 19 May 2016 06:46:29 -0400
From: Rich Rumble <richrumble@...il.com>
To: john-users@...ts.openwall.com
Subject: Re: JtR Jumbo 1.79 on Win7, md5hash matching does not work

On Tue, May 17, 2016 at 12:17 PM, Michael Mckenna-Mattiaccio
<mckennammj@...il.com> wrote:
> Hello all,
>
> I have a folder containing .doc .xls .pdf .ppt .zip files that are
> encrypted and I need to recover their passwords. I have a custom wordlist
> that I know contains at least some correct passwords, but I never get a
> single correct guess.
>
> The Windows binary doesn't ship with office2john but it does ship with
> pdf2john and zip2john as you can see here https://paste.debian.net/686868/
Try the custom builds section of the John wiki:
http://openwall.info/wiki/john/custom-builds
The office2john requires python not PowerShell, I wrapped the py into
an exe and included it in the custom build for windows users.
A search of "office2john windows" turns up the same result
https://www.google.com/search?q=office2john+windows&ie=utf-8&oe=utf-8
> So I used a random tool my company uses called Karen's Directory Printer. I
> fed in the directory with all the files and selected the output of a .txt
> file with just a list of all the md5hashes created by Karen's...
> https://paste.debian.net/686908/
That program, after googling, give you an md5 checksum of the file,
not the encryption of the file.
> Here is some sample output from Johnny
> https://paste.debian.net/hidden/4cf6b99d/
John thinks these are 11 different hash types
HAVAL-128-4, lotus5, MD2, mdc2, mscash, mscash2, NT, Raw-MD5u,
ripemd-128, Snefru-128, NT-old
I don't think Karens tool is needed here.
> I don't think the md5crypt script is included in the Windows binaries for
> Jumbo 1.79 because when I try to run  --format=md5crypt  I get Unknown
> ciphertext format name requested
md5crypt appears to refer to FreeBSD hashes, thanks google
https://www.google.com/search?q=md5crypt&ie=utf-8&oe=utf-8#q=md5crypt+%22john+the+ripper%22
The md5 checksum that Karens tool was outputting won't be of use to you.
http://xinn.org/blog/choosing-the-right-encryption.html
http://xinn.org/blog/password-security.html
> How do I copy the md5 functionality from the github sources so it works in
> JtR?
Office formats are CRC16 (pst's), RC4 (old office) and SHA1+AES these days
https://blogs.msdn.microsoft.com/david_leblanc/2008/12/04/new-improved-office-crypto/
Again the md5 checksum's aren't needed here.
> Also, it doesn't seem to really be using the custom wordlist correctly.
> Whenever I link to the custom wordlist, JtR runs quickly and with no
> results. If I don't use Wordlist mode then at least JtR seems to be trying.
> I even made a .bu of the default wordlist and put my custom wordlist in its
> place in the JTr Jumbo folder and I'm still not seeing results.
john.exe -w wordlist_here.txt -format=office hashes.txt    (could also
be old-office)
That should do it (shouldn't need the format if only office hashes are
in the file), I recommend using rules
john.exe -w wordlist_here.txt hashes.txt -rules=jumbo
> I have tried the *2john feature of Johnny but it doesn't seem to work well
> for me. I was once able to get a pdf password out and removed the prefix
> info for https://paste.debian.net/hidden/1eeeaffd/ but the feature is no
> longer working, it just hangs on Conversion in progress..... I tried with a
> pdf The following command in PowerShell doesn't get me any results either,
> regardless of whether the output file exists at the time the command is
> run: PS C:\Program Files (x86)\john179j5w\john179j5\run> .\office2john.py
> C:\Users\tdmnyadmin\Desktop\Password_Cracking\SampleFiles\001\Doc3.doc
> C:\Users\tdmnyadmin\Desktop\Password_Cracking\office.lst
Again PS isn't going to run python scripts, they do look similar.
> What's the correct command format for these *2john scripts? I can't find
> that in the docs.
We can try to do better, there are tutorials out there for many hash types
http://xinn.org/blog/JtR-AD-Password-Auditing.html
https://countuponsecurity.files.wordpress.com/2015/06/jtr-cheat-sheet.pdf
-rich

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.