01-18-2016, 08:38 AM
01-18-2016, 12:33 PM
why not pepole ask me?
01-24-2016, 02:21 PM
you can use -m 12000 to crack it see https://hashcat.net/wiki/doku.php?id=example_hashes
06-16-2016, 09:15 AM
I also have the same problem and I used the iSeepassword itunes password recovery program to unlock iPhone 6 backup, it works fine, but take 2 hours to crack the password, and not free.
06-16-2016, 12:54 PM
(06-16-2016, 09:15 AM)Anderson11 Wrote: [ -> ]I also have the same problem and I used the iSeepassword itunes password recovery program to unlock iPhone 6 backup, it works fine, but take 2 hours to crack the password, and not free.
did u try what atom suggest ?
06-16-2016, 02:53 PM
(06-16-2016, 12:54 PM)kiara Wrote: [ -> ]did u try what atom suggest ?
Where to find hash, salt and iteration number in the backup to make up an input für hc?
06-16-2016, 10:53 PM
(06-16-2016, 02:53 PM)mkcon Wrote: [ -> ](06-16-2016, 12:54 PM)kiara Wrote: [ -> ]did u try what atom suggest ?
Where to find hash, salt and iteration number in the backup to make up an input für hc?
well before posting i was thinking the same thing, thats why i ask
how do u take out the hash of the itune backup
i followed https://hashcat.net/wiki/doku.php?id=example_hashes
which shows
Quote:12000but nothing about taking out the hash from the encrypted backup.
PBKDF2-HMAC-SHA1
sha1:1000:MzU4NTA4MzIzNzA1MDQ=:19ofiY+ahBXhvkDsp0j2ww==
06-16-2016, 11:16 PM
It's in a plist file. Use google and stop hijacking threads.