hashcat Forum
itunes_backup2hashcat last version - Printable Version

+- hashcat Forum (https://hashcat.net/forum)
+-- Forum: Support (https://hashcat.net/forum/forum-3.html)
+--- Forum: hashcat (https://hashcat.net/forum/forum-45.html)
+--- Thread: itunes_backup2hashcat last version (/thread-9858.html)



itunes_backup2hashcat last version - whirlp00oo00l - 02-08-2021

hello everyone


My iPhone XR is disabled. I want to find the iTunes password using the hashtag trick. I have already backed up iTunes using one method.
But I especially need the latest version of itunes_backup2hashcat to be able to decrypt com.apple.iTunes.plist.
I will use Windows with CPU I7 first, then I can try again with MacBook Pro with CPU I7.
Please guide me. What command line should I use?


thanks for reply


RE: itunes_backup2hashcat last version - Banaanhangwagen - 02-09-2021

Some Googling or searching on this forum would have give you the right answers or directions.



Never heard of a hashtag-trick.



"Decrypt" is not a correct term. See for more info: https://www.techsolvency.com/passwords/dehashing-reversing-decrypting/

In order to extract the hash from an encrypted iTunes-backup, one needs the Manifest.plist and this script https://github.com/philsmd/itunes_backup2hashcat

Compare the output with https://hashcat.net/wiki/doku.php?id=example_hashes in order to determine which mode to use.

Be aware, the iTunes-modes are known to be (very) slow. Use GPU in order to accelerate speed.



Hashcat should run on macOS, but there are known bottlenecks/issues sometimes on certain devices which are not Hashcat-related.