03-20-2024, 02:30 PM
this is a perfect example for a situation where you should first start with trying to crack a known password
so start making a backup of your "empty" phone with a known pass and extract your hash, im not sure wheter iPhone uses your appleID password or your phone pin or if you have to provide a password when making a backup, so this is the first point, use a simple pass like 1234test or similar
never the less, extract this hash and try to crack it, if this cracking is sucessful, you know, that your workflow is correct
second
using wordlists found on the internet to crack a personal password is waste of time (except for one circumstance, that your pass is really really simple and common
it is better to generate a wordlist providing your passwordstyle or known passes, pins you use and combin them with rules
-a3 is bruteforce, mixing this with wordlist wont work
-a0 is wordlsit, you can provide rules with option -r
hashcat -a0 -m 14800 -r rulesfile hashfile dictionary
so start making a backup of your "empty" phone with a known pass and extract your hash, im not sure wheter iPhone uses your appleID password or your phone pin or if you have to provide a password when making a backup, so this is the first point, use a simple pass like 1234test or similar
never the less, extract this hash and try to crack it, if this cracking is sucessful, you know, that your workflow is correct
second
using wordlists found on the internet to crack a personal password is waste of time (except for one circumstance, that your pass is really really simple and common
it is better to generate a wordlist providing your passwordstyle or known passes, pins you use and combin them with rules
-a3 is bruteforce, mixing this with wordlist wont work
-a0 is wordlsit, you can provide rules with option -r
hashcat -a0 -m 14800 -r rulesfile hashfile dictionary