Help with iTunes back up decrypt iOS 9
#6
I am trying to decrypt a iOS 9 back up. sorry I had 14800 (10 or greater) when I meant 14700.( 9 and below) if I am reading that wrong please correct me .

I just followed a step by step tutorial and still am receiving the same no hashes loaded response.

the input I that I built by following the video is ./hashcat -d 1 -m 14700 manifest9.txt -a 3 ?d?d?d?d?

and received ./hashcat -d 1 -m 14700 manifest9.txt -a 3 ?d?d?d?d?
hashcat (v6.2.2-114-g72d7048b7) starting

* Device #2: This device's local mem size is too small.

OpenCL API (OpenCL 1.2 (May 7 2020 00:10:14)) - Platform #1 [Apple]
====================================================================
* Device #1: Intel(R) Core(TM)2 Duo CPU P8600 @ 2.40GHz, 4032/4096 MB (1024 MB allocatable), 2MCU
* Device #2: GeForce 320M, skipped

Minimum password length supported by kernel: 0
Maximum password length supported by kernel: 256

Hash 'manifest9.txt': Separator unmatched
No hashes loaded.

Started: Thu Jul 15 03:25:36 2021
Stopped: Thu Jul 15 03:25:37 2021



as a response

after trying this input through hashcat, It still says no hashes loaded. I followed every step exactly just to get the same error.
it also says devices memory too low. (device 2)

sorry for the vague descritption and trial and error commands, but I am really frustrated, and after following a step by step procedure I still received the same response..
after following everything step by step I don't see why I would receive a no hashes loaded response unless there was some sort of issue..

please help me understand.

this is the tutorial I followed.

https://m.youtube.com/watch?v=MMySnPzsPYU
Reply


Messages In This Thread
Help with iTunes back up decrypt iOS 9 - by sc710 - 07-11-2021, 12:22 PM
RE: Help with iTunes back up decrypt iOS 9 - by sc710 - 07-15-2021, 11:44 AM