Itunes iOS 12.2 backup password encryption - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Support (https://hashcat.net/forum/forum-3.html) +--- Forum: hashcat (https://hashcat.net/forum/forum-45.html) +--- Thread: Itunes iOS 12.2 backup password encryption (/thread-8583.html) Pages:
1
2
|
Itunes iOS 12.2 backup password encryption - Futschel - 08-20-2019 Dear Ladies and Gentleman, I try to encrypt an iOS Backup Password Version 12.2 I created an minifest12.2.txt with the itunes_backup2hashcat.pl from philsmd i started the progress within CMD : Code: hashcat64.exe -d 1 manifest12.2.txt -m 14800 -a 3 ?d?d?d?d --force This is nicely working, what can I try if the password Characters count and type is not known by the enduser ? So if he don't know which characters he used and even when the length is not known any more Kind regards, Futschel RE: Itunes iOS 12.2 backup password encryption - undeath - 08-20-2019 Don't use --force unless you are a developer. You should run more clever attacks than brute-force. For example dictionary+rules. RE: Itunes iOS 12.2 backup password encryption - Futschel - 08-20-2019 Actually the Intel onboard Card OpenCL Driver is not compatible yet, I need to run it as forced ... We dont have an clue for the password, it should be numbers. This night i will try at my AMD Radeon RX480 XFX RX-480P8LFB6 Radeon RX 480 Core Edition 8 GB, GDDR5 The run i wrote above was exhausted, so i need to adjust the values, will now try ?d?d?d?d?d?d?d?d --increment RE: Itunes iOS 12.2 backup password encryption - Futschel - 08-21-2019 Hey everyone, what does the "Approaching final keyspace - workload adjusted" mean for my process ? RE: Itunes iOS 12.2 backup password encryption - undeath - 08-21-2019 If you know it's just numbers and of no other details a mask attack is probably the best you can do. The "approaching final keyspace" notice is not of particular importance. RE: Itunes iOS 12.2 backup password encryption - Futschel - 08-21-2019 (08-21-2019, 08:07 PM)undeath Wrote: If you know it's just numbers and of no other details a mask attack is probably the best you can do. The "approaching final keyspace" notice is not of particular importance. Ah okay this sounds quiet good. I checked the list for windows and AMD Graphicscard Code: AMD GPUs on Windows require "AMD Radeon Software Crimson Edition" (15.12 or later) Code: it is now Crimson 17.11.4 for AMD RX 480 OpenCL23.20.793.1024 I only get Code: Speed.#1.........: 1 H/s (2.98ms) @ Accel:2 Loops:250 Thr:256 Vec:1 RE: Itunes iOS 12.2 backup password encryption - undeath - 08-21-2019 What mask are you running? Are you using increment? iTunes uses very slow hashing, but I don't know how many iterations are usually used. Try adding -O -w3 RE: Itunes iOS 12.2 backup password encryption - Futschel - 08-21-2019 okay it is this mask Code: hashcat64.exe -m 14800 manifest12.2.txt -a 3 ?d?d?d?d?d?d?d?d --increment i will now try with -O -w3 thx for the parameters. Hopefully it will raise the " H/s" RE: Itunes iOS 12.2 backup password encryption - undeath - 08-21-2019 With --increment and no lower limit you will see poor performance for short mask lengths. You can try -S in that case. RE: Itunes iOS 12.2 backup password encryption - Futschel - 08-22-2019 Oh Acually he makes speed ;-) at 7 digits its a 69H/s saddly it seems not to be the solution to recover the password, i mean the only digits search, but I will wait until it is done to see the result. Else i need to ask me Boss again if he remembers anything of the password if there are letters insideand things like that ... @undeath: thx for all the help until now ! |