03-07-2014, 11:22 AM
Hi
I read by physical aqusition with XRY data from two mobile phones:
1. Galaxy 3
2. Galaxy 4 model 9505
I found without any problems password.key file:
1. Galaxy 3: 059A4D874E851DC41B176EAA20BE1A7A9A39EF3F
2. Galaxy 4: F9784B5422627804B0AD38B87159F8049F127476
When I tried to read the salt string I couldn’t read this value from settings.db file.
I used X-Ways program (search key mode) and I found the values in file: locksettings.db-wal:
5lockscreen.password_salt-6238592000407724940_
1. Galaxy 3: -5409215673359023022 – converted to hex by calculator: B4EE9B011BF5C452
2. Galaxy 4: -6238592000407724940 – converted to hex by calculator: A96C11A10D1A9C74
device_policies.xml:
1. Galaxy 3: length="5" uppercase="0" lowercase="0" letters="0" numeric="5" symbols="0" nonletter="5" recoverable="false"
2. Galaxy 4:
active-password quality="262144" length="4" uppercase="0" lowercase="4" letters="4" numeric="0" symbols="0" nonletter="0" recoverable="false".
I used the command:
Galaxy 3: cudahashcat32.exe -a 3 -m 5800 059A4D874E851DC41B176EAA20BE1A7A9A39EF3F:B4EE9B011BF5C452 ?d?d?d?d?d
Galaxy 4: cudaHashcat32.exe -a 3 -m 5800 F9784B5422627804B0AD38B87159F8049F127476:A
96C11A10D1A9C74 ?l?l?l?l
And NOTHING happened whitch could be of use to me
Session.Name...: cudaHashcat
Status.........: Exhausted
Input.Mode.....: Mask (?l?l?l?l) [4]
Hash.Target....: 059a4d874e851dc41b176eaa20be1a7a9a39ef3f:B4EE9B011BF5C452
Hash.Type......: Samsung Android Password/PIN
Time.Started...: Fri Mar 07 09:20:16 2014 (3 secs)
Time.Estimated.: 0 secs
Speed.GPU.#1...: 217.4 kH/s
Recovered......: 0/1 (0.00%) Digests, 0/1 (0.00%) Salts
Progress.......: 456976/456976 (100.00%)
Rejected.......: 0/456976 (0.00%)
HWMon.GPU.#1...: 99% Util, 57c Temp, N/A Fan
Started: Fri Mar 07 09:20:16 2014
Stopped: Fri Mar 07 09:20:20 2014
When I used password.key an salt from forum, was well DONE
941d4637d8223d958d7f2324572c7e319dcea01f:f6d45822728ddb2c:10021981
Session.Name...: cudaHashcat
Status.........: Cracked
Input.Mode.....: Mask (?d?d?d?d?d?d?d?d) [8]
Hash.Target....: 941d4637d8223d958d7f2324572c7e319dcea01f:f6d45822728ddb2c
Hash.Type......: Samsung Android Password/PIN
Time.Started...: Fri Mar 07 08:58:18 2014 (1 min, 57 secs)
Speed.GPU.#1...: 178.7 kH/s
Recovered......: 1/1 (100.00%) Digests, 1/1 (100.00%) Salts
Progress.......: 21135360/100000000 (21.14%)
Rejected.......: 0/21135360 (0.00%)
HWMon.GPU.#1...: 99% Util, 69c Temp, N/A Fan
Why am I not able to recover passwords from my Galaxy’s
I read by physical aqusition with XRY data from two mobile phones:
1. Galaxy 3
2. Galaxy 4 model 9505
I found without any problems password.key file:
1. Galaxy 3: 059A4D874E851DC41B176EAA20BE1A7A9A39EF3F
2. Galaxy 4: F9784B5422627804B0AD38B87159F8049F127476
When I tried to read the salt string I couldn’t read this value from settings.db file.
I used X-Ways program (search key mode) and I found the values in file: locksettings.db-wal:
5lockscreen.password_salt-6238592000407724940_
1. Galaxy 3: -5409215673359023022 – converted to hex by calculator: B4EE9B011BF5C452
2. Galaxy 4: -6238592000407724940 – converted to hex by calculator: A96C11A10D1A9C74
device_policies.xml:
1. Galaxy 3: length="5" uppercase="0" lowercase="0" letters="0" numeric="5" symbols="0" nonletter="5" recoverable="false"
2. Galaxy 4:
active-password quality="262144" length="4" uppercase="0" lowercase="4" letters="4" numeric="0" symbols="0" nonletter="0" recoverable="false".
I used the command:
Galaxy 3: cudahashcat32.exe -a 3 -m 5800 059A4D874E851DC41B176EAA20BE1A7A9A39EF3F:B4EE9B011BF5C452 ?d?d?d?d?d
Galaxy 4: cudaHashcat32.exe -a 3 -m 5800 F9784B5422627804B0AD38B87159F8049F127476:A
96C11A10D1A9C74 ?l?l?l?l
And NOTHING happened whitch could be of use to me
Session.Name...: cudaHashcat
Status.........: Exhausted
Input.Mode.....: Mask (?l?l?l?l) [4]
Hash.Target....: 059a4d874e851dc41b176eaa20be1a7a9a39ef3f:B4EE9B011BF5C452
Hash.Type......: Samsung Android Password/PIN
Time.Started...: Fri Mar 07 09:20:16 2014 (3 secs)
Time.Estimated.: 0 secs
Speed.GPU.#1...: 217.4 kH/s
Recovered......: 0/1 (0.00%) Digests, 0/1 (0.00%) Salts
Progress.......: 456976/456976 (100.00%)
Rejected.......: 0/456976 (0.00%)
HWMon.GPU.#1...: 99% Util, 57c Temp, N/A Fan
Started: Fri Mar 07 09:20:16 2014
Stopped: Fri Mar 07 09:20:20 2014
When I used password.key an salt from forum, was well DONE
941d4637d8223d958d7f2324572c7e319dcea01f:f6d45822728ddb2c:10021981
Session.Name...: cudaHashcat
Status.........: Cracked
Input.Mode.....: Mask (?d?d?d?d?d?d?d?d) [8]
Hash.Target....: 941d4637d8223d958d7f2324572c7e319dcea01f:f6d45822728ddb2c
Hash.Type......: Samsung Android Password/PIN
Time.Started...: Fri Mar 07 08:58:18 2014 (1 min, 57 secs)
Speed.GPU.#1...: 178.7 kH/s
Recovered......: 1/1 (100.00%) Digests, 1/1 (100.00%) Salts
Progress.......: 21135360/100000000 (21.14%)
Rejected.......: 0/21135360 (0.00%)
HWMon.GPU.#1...: 99% Util, 69c Temp, N/A Fan
Why am I not able to recover passwords from my Galaxy’s