|
Message-ID: <957638204.1608327.1572859756547@mail.yahoo.com> Date: Mon, 4 Nov 2019 09:29:16 +0000 (UTC) From: john difool <jdifool2005@...oo.fr> To: "john-users@...ts.openwall.com" <john-users@...ts.openwall.com> Subject: Help needed with with --bilocker: No passwors hash loaded Error Hi there, I'm trying to use JtR to uncrypt a bitlocker-ed image disk on Linux (Debian distribution) I've downloaded and compiled last version. Here are some of the output with opencl info in bold characters optional libraries/features found: Memory map (share/page large files) ........ yes Fork support ............................... yes OpenMP support ............................. yes (not for fast formats) OpenCL support ............................. yes Generic crypt(3) format .................... yes libgmp (PRINCE mode and faster SRP formats) yes 128-bit integer (faster PRINCE mode) ....... yes libz (pkzip and some other formats) ........ no libbz2 (gpg2john extra decompression logic) no libpcap (vncpcap2john and SIPdump) ......... no OpenMPI support (default disabled) ......... no ZTEX USB-FPGA module 1.15y support ......... no gcc -g -m64 -L/usr/local/lib -L/usr/lib64 -L/lib64 -pthread uaf2john.o uaf_encode.o -fopenmp -o ../run/uaf2john gcc -DAC_BUILT -msse4.2 -DJOHN_SSE4_2 -c -m64 -g -O2 -I/usr/local/include -DARCH_LITTLE_ENDIAN=1 -Wall -Wno-stringop-truncation -Wno-format-overflow -Wno-format-truncation -fno-omit-frame-pointer --param allow-store-data-races=0 -Wno-deprecated-declarations -Wunused-but-set-variable -std=gnu89 -Wdate-time -D_POSIX_SOURCE -D_GNU_SOURCE -D_XOPEN_SOURCE=600 -fopenmp -pthread -I/usr/local/include -DCL_SILENCE_DEPRECATION -DHAVE_OPENCL -pthread -funroll-loops wpapcap2john.c -o wpapcap2john.o > john --list=formats descrypt, bsdicrypt, md5crypt, md5crypt-long, bcrypt, scrypt, LM, AFS, tripcode, AndroidBackup, adxcrypt, agilekeychain, aix-ssha1, aix-ssha256, aix-ssha512, andOTP, ansible, argon2, as400-des, as400-ssha1, asa-md5, AxCrypt, AzureAD, BestCrypt, bfegg, Bitcoin, BitLocker, bitshares, Bitwarden, BKS, Blackberry-ES10, WoWSRP, Blockchain, chap, Clipperz, cloudkeychain, dynamic_n, cq, CRC32, sha1crypt, sha256crypt, sha512crypt, Citrix_NS10, dahua, dashlane, diskcryptor, Django, django-scrypt, dmd5, dmg, dominosec, dominosec8, DPAPImk, dragonfly3-32, dragonfly3-64, dragonfly4-32, dragonfly4-64, Drupal7, eCryptfs, eigrp, electrum, EncFS, enpass, EPI, EPiServer, ethereum, fde, Fortigate256, Fortigate, FormSpring, FVDE, geli, gost, gpg, HAVAL-128-4, HAVAL-256-3, hdaa, hMailServer, hsrp, IKE, ipb2, itunes-backup, iwork, KeePass, keychain, keyring, keystore, known_hosts, krb4, krb5, krb5asrep, krb5pa-sha1, krb5tgs, krb5-17, krb5-18, krb5-3, kwallet, lp, lpcli, leet, lotus5, lotus85, LUKS, MD2, mdc2, MediaWiki, monero, money, MongoDB, scram, Mozilla, mscash, mscash2, MSCHAPv2, mschapv2-naive, krb5pa-md5, mssql, mssql05, mssql12, multibit, mysqlna, mysql-sha1, mysql, net-ah, nethalflm, netlm, netlmv2, net-md5, netntlmv2, netntlm, netntlm-naive, net-sha1, nk, notes, md5ns, nsec3, NT, o10glogon, o3logon, o5logon, ODF, Office, oldoffice, OpenBSD-SoftRAID, openssl-enc, oracle, oracle11, Oracle12C, osc, ospf, Padlock, Palshop, Panama, PBKDF2-HMAC-MD4, PBKDF2-HMAC-MD5, PBKDF2-HMAC-SHA1, PBKDF2-HMAC-SHA256, PBKDF2-HMAC-SHA512, PDF, PEM, pfx, pgpdisk, pgpsda, pgpwde, phpass, PHPS, PHPS2, pix-md5, PKZIP, po, postgres, PST, PuTTY, pwsafe, qnx, RACF, RACF-KDFAES, radius, RAdmin, RAKP, rar, RAR5, Raw-SHA512, Raw-Blake2, Raw-Keccak, Raw-Keccak-256, Raw-MD4, Raw-MD5, Raw-MD5u, Raw-SHA1, Raw-SHA1-AxCrypt, Raw-SHA1-Linkedin, Raw-SHA224, Raw-SHA256, Raw-SHA3, Raw-SHA384, ripemd-128, ripemd-160, rsvp, Siemens-S7, Salted-SHA1, SSHA512, sapb, sapg, saph, sappse, securezip, 7z, Signal, SIP, skein-256, skein-512, skey, SL3, Snefru-128, Snefru-256, LastPass, SNMP, solarwinds, SSH, sspr, STRIP, SunMD5, SybaseASE, Sybase-PROP, tacacs-plus, tcp-md5, telegram, tezos, Tiger, tc_aes_xts, tc_ripemd160, tc_ripemd160boot, tc_sha512, tc_whirlpool, vdi, OpenVMS, vmx, VNC, vtp, wbb3, whirlpool, whirlpool0, whirlpool1, wpapsk, wpapsk-pmk, xmpp-scram, xsha, xsha512, ZIP, ZipMonster, plaintext, has-160, HMAC-MD5, HMAC-SHA1, HMAC-SHA224, HMAC-SHA256, HMAC-SHA384, HMAC-SHA512, dummy, crypt > john John the Ripper 1.9.0-jumbo-1 OMP [linux-gnu 64-bit x86_64 SSE4.2 AC] Copyright (c) 1996-2019 by Solar Designer and others Homepage: http://www.openwall.com/john/ ... I've created a dictionary and generated hashes using John2bitlocker but whatever the hash file I use I get an error "No passwors hash loaded". Why is that? > bitlocker2john -i disk.img > cat target_hash $bitlocker$3$16$3adb3d7f8dfbe03dc3f4cef931aad1e9$1048576$12$e04a4339a66cd50162000000$60$1e93c2f48241aa8af137dee6e6aa3ad5584febef62857e0462a674cbe8b21268b1dc7633b302fcc5a268cdd52d44adb5b55cb3e1c082c79d724bc903 > john --format=bitlocker --wordlist=dictionnary.txt target_hash Using default input encoding: UTF-8 No password hashes loaded (see FAQ) Any help much appreciated!
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.