John The Ripper is a free and open-source software for fast password cracking. Cracking DMG, RAR and other types of passwords is made easier using magnumripper's 'jumbo' version of John The Ripper.
Option) might be already cracked by previous invocations of John. (The message printed in that case has been changed to 'No password hashes left to crack (see FAQ)' starting with version 1.7.7.) To display cracked passwords, use 'john -show' on your password hash file(s). To force John to crack those same hashes again, remove the john.pot file. John the Ripper – Cracking Passwords The following example shows John’s ability to guess the correct format for password entries. First, create a text file named windows.txt with the following two lines containing an entry for “Ged” and “Arha.”. John the ripper no password hashes loaded zip, So do not expect millions of hash per second, at least till a network-distributed version of mdcrack has been released Send me your benchmarks here to refresh the performance table. Tool added to MDCrack Zip file. Cis7.exe is a small satellite tool for en/decoding of Cisco passwords type 7. John The Ripper is a free password cracking tool that runs on a many platforms. It has become one of the best password cracking tools as it combines several other password crackers into a single package and has a number of handy features like automatic hash type detection.
Install John
Install John The Ripper using brew
Find John The Ripper Utilities Folder
John comes with extra utilities to help generate hashes. By default brew
does not install/symlink john's extra utilities to the PATH folder /usr/local/bin
. The path can be found in a variety of ways:
- Using
ls
and following the path will eventually return/usr/local/Cellar/john-jumbo/1.9.0/share/john/
or similar:
- If you have
readlink
installed, it's even easier:
Generating Hashes
When cracking files, John cracks the hash of the password rather than the file itself. To generate the hash files, we use the extra utilities from the folder in the last step.
For DMG files, we'll pass the encrypted-files.dmg
file to the dmg2john
command and output the hash to a .hash
file.
The other tools available to generate hash files are:
- RAR:
rar2john_cmd
- PDF:
pdf2john.pl
- ZIP:
zip2john
- 7Z:
7z2john.pl
Crack the Hash
The last step is to crack the hash. We use the john
tool directly for this step.
To ensure the GPU instead of the CPU is doing the cracking, specify a format with -opencl
in its suffix. For example, dmg
will be significantly slower than using dmg-opencl
.
John The Ripper 0 Password Hashes Cracked 1 Left Hand Thread
You can see the password above is abc_123
. If it's not clear you can run john --show encrypted-files.dmg.hash
to present it clearer.
To make things even faster, if you have an idea of what the password is, you can pass a regular expression to john using the --mask
flag.
Another thing I like to do at the end is remove the password on the DMG file and keep it empty:
Now when you open it, click the OK button.
Script
John The Ripper 0 Password Hashes Cracked 1 Left Hand 2
To put all the above together, I use this script to set aliases to crack DMG files