Posts: 7
Threads: 1
Joined: Jan 2023
Hello everyone, I have issues with a 7zip hash being recognized. The 7zip archive is made by Cobian backup tool.
I have tried extracting the hash using hashcat and the john tool. Both methods worked and the extracted 7z hashes are identical. I have tried it in The-Distribution-Which-Does-Not-Handle-OpenCL-Well (Kali) and win 10.
When I try to load the hash for password crunching I get an error that the hash can not be loaded (due to a length issue?)
The hash is in a .txt file and looks like this $7z1$18$0$16$[xxxx], 238 characters in total. Hashcat reads the file as it shows the hash in the .txt file in the error message.
The hash is formatted in a single row. Am I an idiot? Can Cobian have changed the encryption? I can access the archive separately and see the file structure, yet access to the files requires a password.
Thanks
Posts: 385
Threads: 1
Joined: Aug 2020
01-04-2023, 10:51 AM
(This post was last modified: 01-04-2023, 11:06 AM by marc1n.)
command & screenshot?
example 7z hash (pass:hashcat)
$7z$0$19$0$salt$8$f6196259a7326e3f0000000000000000$185065650$112$98$f3bc2a88062c419a25acd40c0c2d75421cf23263f69c51b13f9b1aada41a8a09f9adeae45d67c60b56aad338f20c0dcc5eb811c7a61128ee0746f922cdb9c59096869f341c7a9cb1ac7bb7d771f546b82cf4e6f11a5ecd4b61751e4d8de66dd6e2dfb5b7d1022d2211e2d66ea1703f96
Posts: 7
Threads: 1
Joined: Jan 2023
01-04-2023, 05:50 PM
(This post was last modified: 01-04-2023, 05:51 PM by cola.)
Here is the result of the cracking attempt with a random mask:
Code:
hashcat -a 3 -m 11600 321.hash ?l?l?l?l?l?l?l?l?l
hashcat (v6.2.6) starting
OpenCL API (OpenCL 3.0 PoCL 3.0+debian Linux, None+Asserts, RELOC, LLVM 13.0.1, SLEEF, DISTRO, POCL_DEBUG) - Platform #1 [The pocl project]
============================================================================================================================================
* Device #1: pthread-AMD Ryzen 9 3900X 12-Core Processor, 31062/62188 MB (8192 MB allocatable), 24MCU
This hash-mode is known to emit multiple valid candidates for the same hash.
Use --keep-guessing to continue attack after finding the first crack.
Minimum password length supported by kernel: 0
Maximum password length supported by kernel: 256
Hashfile '321.hash' on line 1 ($7$1$1...416231c8d30778412$100$5d00004000): Signature unmatched
No hashes loaded.
Started: Wed Jan 4 17:28:08 2023
Stopped: Wed Jan 4 17:28:08 2023
The 7z archive/files are not encrypted in any way, just password protected. I can also try running hashcat on my Dell R420 - ubuntu 20.4 - ,but it will take some time setting up the machine and I doubt this will solve the issue
I could post the hash, but from what I know, posting complete hashes is not allowed.
Posts: 385
Threads: 1
Joined: Aug 2020
(01-04-2023, 05:50 PM)cola Wrote: Here is the result of the cracking attempt with a random mask:
Code:
hashcat -a 3 -m 11600 321.hash ?l?l?l?l?l?l?l?l?l
hashcat (v6.2.6) starting
OpenCL API (OpenCL 3.0 PoCL 3.0+debian Linux, None+Asserts, RELOC, LLVM 13.0.1, SLEEF, DISTRO, POCL_DEBUG) - Platform #1 [The pocl project]
============================================================================================================================================
* Device #1: pthread-AMD Ryzen 9 3900X 12-Core Processor, 31062/62188 MB (8192 MB allocatable), 24MCU
This hash-mode is known to emit multiple valid candidates for the same hash.
Use --keep-guessing to continue attack after finding the first crack.
Minimum password length supported by kernel: 0
Maximum password length supported by kernel: 256
Hashfile '321.hash' on line 1 ($7$1$1...416231c8d30778412$100$5d00004000): Signature unmatched
No hashes loaded.
Started: Wed Jan 4 17:28:08 2023
Stopped: Wed Jan 4 17:28:08 2023
The 7z archive/files are not encrypted in any way, just password protected. I can also try running hashcat on my Dell R420 - ubuntu 20.4 - ,but it will take some time setting up the machine and I doubt this will solve the issue
I could post the hash, but from what I know, posting complete hashes is not allowed.
You can see by the header that your 7z version is different and probably not supported by hashcat
Posts: 7
Threads: 1
Joined: Jan 2023
Well this is bad news... Is there anything else that I can try?
Posts: 385
Threads: 1
Joined: Aug 2020
(01-04-2023, 08:40 PM)cola Wrote: Well this is bad news... Is there anything else that I can try?
https://www.openwall.com/john/
Posts: 7
Threads: 1
Joined: Jan 2023
john gives a similar error. I had no idea Cobian 7z archives are so hard to crack.
Posts: 385
Threads: 1
Joined: Aug 2020
(01-04-2023, 11:57 PM)cola Wrote: john gives a similar error. I had no idea Cobian 7z archives are so hard to crack.
This means that Cobain has his own proprietary 7z encryption algorithm
Posts: 7
Threads: 1
Joined: Jan 2023
But shouldn't this tie the archive to Cobian itself, and make impossible to use other software to open it? I made a test today and winrar opens the password protected 7z cobian backups with no issues if I use the correct pass. This shouldn't work if the encryption key was generated by a different algorithm.
Sorry if my questions seem silly, I am quite new at this.
Posts: 7
Threads: 1
Joined: Jan 2023
Bump. Any other ideas? The backups are not extremely important, but recovering the pass would help a lot.