itunes_backup2hashcat last version - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Support (https://hashcat.net/forum/forum-3.html) +--- Forum: hashcat (https://hashcat.net/forum/forum-45.html) +--- Thread: itunes_backup2hashcat last version (/thread-9858.html) |
itunes_backup2hashcat last version - whirlp00oo00l - 02-08-2021 hello everyone My iPhone XR is disabled. I want to find the iTunes password using the hashtag trick. I have already backed up iTunes using one method. But I especially need the latest version of itunes_backup2hashcat to be able to decrypt com.apple.iTunes.plist. I will use Windows with CPU I7 first, then I can try again with MacBook Pro with CPU I7. Please guide me. What command line should I use? thanks for reply RE: itunes_backup2hashcat last version - Banaanhangwagen - 02-09-2021 Some Googling or searching on this forum would have give you the right answers or directions. Never heard of a hashtag-trick. "Decrypt" is not a correct term. See for more info: https://www.techsolvency.com/passwords/dehashing-reversing-decrypting/ In order to extract the hash from an encrypted iTunes-backup, one needs the Manifest.plist and this script https://github.com/philsmd/itunes_backup2hashcat Compare the output with https://hashcat.net/wiki/doku.php?id=example_hashes in order to determine which mode to use. Be aware, the iTunes-modes are known to be (very) slow. Use GPU in order to accelerate speed. Hashcat should run on macOS, but there are known bottlenecks/issues sometimes on certain devices which are not Hashcat-related. |