Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

hashcat Forum

Full Version: How to crack Apple Secure Notes?
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
I've extracted the hash via the tool from Johntheripple

Code:
NoteStore.sqlite:$ASN$*30*20000*f47190017f7edb0be98586d6ee102119*.....................:::::old

Tried to crack with the following command

Code:
Hashcat -m 16200 $ASN$*30*20000*f47190017f7edb0be98586d6ee102119*....................

and returns

Quote:hashcat (v5.1.0) starting...

OpenCL Platform #1: Apple
=========================
* Device #1: Intel(R) Core(TM) i9-9880H CPU @ 2.30GHz, skipped.
* Device #2: Intel(R) UHD Graphics 630, 384/1536 MB allocatable, 24MCU
* Device #3: AMD Radeon Pro 5500M Compute Engine, 1020/4080 MB allocatable, 24MCU

Hash '30*20000*f47190017f7edb0be98586d6ee102119*....................: Separator unmatched
No hashes loaded.

Started: Sun Jul 12 22:26:53 2020
Stopped: Sun Jul 12 22:26:53 2020


May I know did i execute wrongly? or what's the right way to use this?
Wrap the hash in single quotes or save it in a text file, otherwise your shell will try to interpret some special characters and pass invalid data to hashcat.
(07-12-2020, 04:33 PM)undeath Wrote: [ -> ]Wrap the hash in single quotes or save it in a text file, otherwise your shell will try to interpret some special characters and pass invalid data to hashcat.

Thanks for quick respond.
Yes, save to a file and it work. What about attack mode?

Anyone could suggest me the attack mode please.
Code:
ATTENTION! Read timeout in stdin mode. The password candidates input is too slow:
* Are you sure that you are using the correct attack mode (--attack-mode or -a)?
* Are you sure that you want to use input from standard input (stdin)?
* If so, are you sure that the input from stdin (the pipe) is working correctly and is fast enough?
Thanks!!!
Code:
hashcat -m 16200 -a 0 -w 3 -r rules/best64.rule hash_file.txt word_list.txt