Posts: 15
Threads: 5
Joined: Oct 2019
Is there documentation on how to appropriately exfiltrate target hash/material for the various supported types?
I.e. how to prep MS docs to obtain hash data or Apple notes, or various FDE schemes? Thanks 😊
Posts: 2,267
Threads: 16
Joined: Feb 2013
office2john.py
7z2hashcat.py
blockchain2john.py
bitcoin2john.py
1password2john.py
itunes_backup2hashcat.pl
etc
it depends on your hash type
they can be found on the internet very easily (just search for what you are looking for, example hashes are here
https://hashcat.net/wiki/example_hashes)
Posts: 15
Threads: 5
Joined: Oct 2019
(10-17-2019, 08:49 PM)philsmd Wrote: office2john.py
7z2hashcat.py
blockchain2john.py
bitcoin2john.py
1password2john.py
itunes_backup2hashcat.pl
etc
it depends on your hash type
they can be found on the internet very easily (just search for what you are looking for, example hashes are here https://hashcat.net/wiki/example_hashes)
Thanks Phil, I am experienced with JTR.Â
But aren’t these JTR scripts? Isn’t there an equivalent for Hashcat? Is JTR what folks use?
Posts: 2,267
Threads: 16
Joined: Feb 2013
wherever possible it makes sense to not invent a new hash format. so it makes sense to use the same signature and data parts/salts etc in the hashcat format like in the jtr format. it doesn't make sense to reinvent the wheel here