passcode generating...
 
Notifications
Clear all

passcode generating software w/ known partial Itune encrypt

7 Posts
7 Users
0 Likes
1,155 Views
Tackleberry
(@tackleberry)
Posts: 30
Eminent Member
Topic starter
 

Has anyone used a passcode generating software to generate txt file or table based on known possible variations.
Itunes is encrypted, the owner knows "Kinda" what the encryption code should be. I have manually started a txt file with variations for "load from File" option into cellebrite to decrypt, but its 9 digits. abc1234abc is format of code. we hve some letters and they are fairly certain on the numbers.
All the software so far that we tested doesn't' allow us to focus any ny variations of the first 3 letters (lower & Upper case) or the last 3 letters (lower upper case.
any suggestions?
I have begun to look at…
PwTech3.0
pasgen
rainbowcrack 1.7
hash_suite-free

THANKS!

 
Posted : 08/05/2020 4:35 pm
jaclaz
(@jaclaz)
Posts: 5133
Illustrious Member
 

Maybe you want something like
https://github.com/sc0tfree/mentalist
https://github.com/sc0tfree/mentalist/wiki
?

But wouldn't hashcat mask attack (actually mask processor) do?
https://hashcat.net/wiki/doku.php?id=mask_attack
https://hashcat.net/wiki/doku.php?id=maskprocessor

jaclaz

 
Posted : 08/05/2020 5:51 pm
UnallocatedClusters
(@unallocatedclusters)
Posts: 570
Honorable Member
 

Hello,

Page 432 of Forensic Explorer's User Guide might have some insight

30.1.17DECRYPTING AN ITUNES BACKUP
As the password is stored within the iTunes backup, it is susceptible to a password attack by brute-force, or dictionary methods. There are several commercial tools available to decrypt then export files, including
• Tenorshare’s iPhone Backup Unlocker (6), http//www.tenorshare.com/products/iphone-backupunlocker.html (password breaking and decryption);
• IPhone Backup Extractor Pro, http//www.iphonebackupextractor.com (24) (used to extract files once
password is known).
ITunes backup password breaking and decryption can be
• Run directly on the suspects computer during a Live Boot session (see Live Boot section 30.1.18 below);
or,
• Run on encrypted files exported from the case to the forensic workstation (recommended for faster processing speed).

If a complex password is suspected, it can be beneficial to use Forensic Explorer to create a customized dictionary file using keywords located on the suspect’s computer. This is done in the Index Search module by indexing the device (or part thereof) and exporting the list using the Export Words button.

 
Posted : 08/05/2020 6:04 pm
vkc21
(@vkc21)
Posts: 25
Eminent Member
 

I have successfully used AccessData Password Recovery Toolkit (PRTK). You backup the iPhone and attack the manfest.plist with PRTK. It will take 5 to 10 minutes.

This post was modified 3 years ago by vkc21
 
Posted : 20/05/2020 8:24 pm
athulin
(@athulin)
Posts: 1143
Noble Member
 
Posted by: tackleberry

Has anyone used a passcode generating software to generate txt file or table based on known possible variations.

John the Ripper can be set up for that -- one of its cracking modes is to generate passwords based on already observed password statistics.  It works better than expected -- unless you try to run it without any knowledge of passwords, in which case it's no better than random guessing.

JtR can be set up to just output the passwords it would try, so you can just pipe everything into a text file.

 

As for the exhaustive and static methods you suggest (abc123 patterns, etc.)  I've found it easy enough to write the code for it. 

 
Posted : 20/05/2020 8:35 pm
fissa
(@fissa)
Posts: 27
Eminent Member
 

This might be what you are looking for: 

https://m.youtube.com/watch?v=bFl66jTv73g

 
Posted : 12/07/2020 9:03 am
passcodeunlock
(@passcodeunlock)
Posts: 792
Prominent Member
 

I would simply use Passware or Elcomsoft products for this kind of task if you consider payed software.

Hashcat is a free option if you have a lot of time and guidelines to it 🙂

 
Posted : 12/07/2020 7:22 pm
Share:
Share to...