I am trying to recover the password for an encrypted Iphone Xs backup.
I ran backup2hashcat.pl on a backup made with IOS 12.x installed on the phone and got the following hash.
$itunes_backup$*10*90683dfb6......
Recently, I made another backup of the same phone on the same computer, but with IOS 13.x installed on the phone and got the following hash after running backup2hashcat.pl
$itunes_backup$*10*f3511bf3b009......
The encrypted password was never changed on the phone.
I want to run Hashcat on a wordlist I created with Mentalist (I remember certain parts of the password).
What hash do I use?
Why are the hashes different?
Does backup2hashcat.pl even work on IOS 12.x or 13.x?
Does IOS 12.x or 13.x use a different hash format that needs other modifications in hashcat before I run through my wordlist?
Thanks
I ran backup2hashcat.pl on a backup made with IOS 12.x installed on the phone and got the following hash.
$itunes_backup$*10*90683dfb6......
Recently, I made another backup of the same phone on the same computer, but with IOS 13.x installed on the phone and got the following hash after running backup2hashcat.pl
$itunes_backup$*10*f3511bf3b009......
The encrypted password was never changed on the phone.
I want to run Hashcat on a wordlist I created with Mentalist (I remember certain parts of the password).
What hash do I use?
Why are the hashes different?
Does backup2hashcat.pl even work on IOS 12.x or 13.x?
Does IOS 12.x or 13.x use a different hash format that needs other modifications in hashcat before I run through my wordlist?
Thanks