|
Message-ID: <30226974.195776.1572938876207@mail.yahoo.com> Date: Tue, 5 Nov 2019 07:27:56 +0000 (UTC) From: john difool <jdifool2005@...oo.fr> To: john-users@...ts.openwall.com Subject: Re: Help needed with with --bilocker: No passwors hash loaded Error I didn't copy the whole output or maybe you're right. Anyway here is the full output of the binary I compiled: # ./john-1.9.0-jumbo-1/run/john --list=formats descrypt, bsdicrypt, md5crypt, md5crypt-long, bcrypt, scrypt, LM, AFS, tripcode, AndroidBackup, adxcrypt, agilekeychain, aix-ssha1, aix-ssha256, aix-ssha512, andOTP, ansible, argon2, as400-des, as400-ssha1, asa-md5, AxCrypt, AzureAD, BestCrypt, bfegg, Bitcoin, BitLocker, bitshares, Bitwarden, BKS, Blackberry-ES10, WoWSRP, Blockchain, chap, Clipperz, cloudkeychain, dynamic_n, cq, CRC32, sha1crypt, sha256crypt, sha512crypt, Citrix_NS10, dahua, diskcryptor, Django, django-scrypt, dmd5, dmg, dominosec, dominosec8, DPAPImk, dragonfly3-32, dragonfly3-64, dragonfly4-32, dragonfly4-64, Drupal7, eCryptfs, eigrp, EncFS, enpass, EPI, EPiServer, ethereum, fde, Fortigate256, Fortigate, FormSpring, FVDE, geli, gost, gpg, HAVAL-128-4, HAVAL-256-3, hdaa, hMailServer, hsrp, IKE, ipb2, itunes-backup, iwork, KeePass, keychain, keyring, keystore, known_hosts, krb4, krb5, krb5asrep, krb5pa-sha1, krb5tgs, krb5-17, krb5-18, krb5-3, kwallet, lp, lpcli, leet, lotus5, lotus85, LUKS, MD2, mdc2, MediaWiki, monero, money, MongoDB, scram, Mozilla, mscash, mscash2, MSCHAPv2, mschapv2-naive, krb5pa-md5, mssql, mssql05, mssql12, multibit, mysqlna, mysql-sha1, mysql, net-ah, nethalflm, netlm, netlmv2, net-md5, netntlmv2, netntlm, netntlm-naive, net-sha1, nk, notes, md5ns, nsec3, NT, o10glogon, o3logon, o5logon, ODF, Office, oldoffice, OpenBSD-SoftRAID, openssl-enc, oracle, oracle11, Oracle12C, osc, ospf, Padlock, Palshop, Panama, PBKDF2-HMAC-MD4, PBKDF2-HMAC-MD5, PBKDF2-HMAC-SHA1, PBKDF2-HMAC-SHA256, PBKDF2-HMAC-SHA512, PDF, PEM, pfx, pgpdisk, pgpsda, pgpwde, phpass, PHPS, PHPS2, pix-md5, po, postgres, PST, PuTTY, pwsafe, qnx, RACF, RACF-KDFAES, radius, RAdmin, RAKP, rar, RAR5, Raw-SHA512, Raw-Blake2, Raw-Keccak, Raw-Keccak-256, Raw-MD4, Raw-MD5, Raw-MD5u, Raw-SHA1, Raw-SHA1-AxCrypt, Raw-SHA1-Linkedin, Raw-SHA224, Raw-SHA256, Raw-SHA3, Raw-SHA384, ripemd-128, ripemd-160, rsvp, Siemens-S7, Salted-SHA1, SSHA512, sapb, sapg, saph, sappse, securezip, 7z, Signal, SIP, skein-256, skein-512, skey, SL3, Snefru-128, Snefru-256, LastPass, SNMP, solarwinds, SSH, sspr, Stribog-256, Stribog-512, STRIP, SunMD5, SybaseASE, Sybase-PROP, tacacs-plus, tcp-md5, telegram, tezos, Tiger, tc_aes_xts, tc_ripemd160, tc_ripemd160boot, tc_sha512, tc_whirlpool, vdi, OpenVMS, vmx, VNC, vtp, wbb3, whirlpool, whirlpool0, whirlpool1, wpapsk, wpapsk-pmk, xmpp-scram, xsha, xsha512, ZIP, ZipMonster, plaintext, has-160, HMAC-MD5, HMAC-SHA1, HMAC-SHA224, HMAC-SHA256, HMAC-SHA384, HMAC-SHA512, sha1crypt-opencl, KeePass-opencl, oldoffice-opencl, PBKDF2-HMAC-MD4-opencl, PBKDF2-HMAC-MD5-opencl, PBKDF2-HMAC-SHA1-opencl, rar-opencl, RAR5-opencl, TrueCrypt-opencl, lotus5-opencl, AndroidBackup-opencl, agilekeychain-opencl, ansible-opencl, axcrypt-opencl, axcrypt2-opencl, bcrypt-opencl, BitLocker-opencl, bitwarden-opencl, blockchain-opencl, cloudkeychain-opencl, md5crypt-opencl, sha256crypt-opencl, sha512crypt-opencl, descrypt-opencl, diskcryptor-opencl, diskcryptor-aes-opencl, dmg-opencl, EncFS-opencl, enpass-opencl, ethereum-opencl, ethereum-presale-opencl, FVDE-opencl, geli-opencl, gpg-opencl, iwork-opencl, keychain-opencl, keyring-opencl, keystore-opencl, krb5pa-md5-opencl, krb5pa-sha1-opencl, krb5asrep-aes-opencl, lp-opencl, lpcli-opencl, LM-opencl, mscash-opencl, mscash2-opencl, mysql-sha1-opencl, notes-opencl, NT-opencl, ntlmv2-opencl, o5logon-opencl, ODF-opencl, office-opencl, OpenBSD-SoftRAID-opencl, PBKDF2-HMAC-SHA256-opencl, PBKDF2-HMAC-SHA512-opencl, pfx-opencl, pgpdisk-opencl, pgpsda-opencl, pgpwde-opencl, PHPass-opencl, pwsafe-opencl, RAKP-opencl, raw-MD4-opencl, raw-MD5-opencl, raw-SHA1-opencl, raw-SHA256-opencl, raw-SHA512-free-opencl, raw-SHA512-opencl, salted-SHA1-opencl, sappse-opencl, 7z-opencl, SL3-opencl, solarwinds-opencl, ssh-opencl, sspr-opencl, strip-opencl, telegram-opencl, tezos-opencl, vmx-opencl, wpapsk-opencl, wpapsk-pmk-opencl, XSHA512-free-opencl, XSHA512-opencl, ZIP-opencl, dummy, crypt I see a lot of opencl but is that correct for bitlocker? Anyway: ./john-1.9.0-jumbo-1/run/john --format=bitlocker --wordlist=dictionnary.txt target_hashUsing default input encoding: UTF-8 No password hashes loaded (see FAQ) Thx John Le lundi 4 novembre 2019 à 15:50:44 UTC+1, Solar Designer <solar@...nwall.com> a écrit : On Mon, Nov 04, 2019 at 09:29:16AM +0000, john difool wrote: > I'm trying to use JtR to uncrypt a bitlocker-ed image disk on Linux (Debian distribution) > > I've downloaded and compiled last version. Here are some of the output with opencl info Great. > in bold characters You can't really have those on a text only mailing list (no HTML). > OpenCL support ............................. yes So yes, you successfully configured for OpenCL, and the build is supposed to have that or else it wouldn't complete, which I assume it did (since you quoted a gcc invocation late in the build). > > john --list=formats However, you don't have any -opencl formats in the output of this command. My guess is you ended up running a "john" binary other than what you built. Maybe your system has one installed globally. To use your local build, you probably need something like: cd ../run ./john --list=formats Note the leading "./", which requests running the program from the current directory. > I've created a dictionary and generated hashes using John2bitlocker but whatever the hash file I use I get an error "No passwors hash loaded". Why is that? > > > bitlocker2john -i disk.img > > > cat target_hash > $bitlocker$3$16$3adb3d7f8dfbe03dc3f4cef931aad1e9$1048576$12$e04a4339a66cd50162000000$60$1e93c2f48241aa8af137dee6e6aa3ad5584febef62857e0462a674cbe8b21268b1dc7633b302fcc5a268cdd52d44adb5b55cb3e1c082c79d724bc903 > > > john --format=bitlocker --wordlist=dictionnary.txt target_hash > > Using default input encoding: UTF-8 > No password hashes loaded (see FAQ) Some of the subtypes of Bitlocker (non-)hashes are only supported by our OpenCL format (thus, bitlocker-opencl), not the CPU format (bitlocker). So you actually need an OpenCL-enabled build, and I suggest that you omit the "--format" option in order to let JtR autodetect whatever format will accept the hash without you limiting its possible choices. The command may be like: ./john target_hash You'll add more options after you get this basic invocation working. I hope this helps. Alexander
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.