\rar2john.exe some.rar | sc -Encoding utf8 hashes.txt Or on Linux: iconv -f ISO_8859-16 -t UTF-8 -o hashes.txt hashes_utf8.txt I changed the file encoding instead of using the -encoding flag since it's just one less argument to have to use: Get-Content hashes.txt | Set-Content -Encoding utf8 hashes_utf8.txt The default encoding is utf-8, but you could change the expected input file encoding with -encoding=NAME.\john.exe rar.hashes If on Windows, the redirect will output to a file with Unicode encoding and the john.exe doesn't like that. The hashes will look like below and the longer the password the more hash entries. In this case rar2john.exe is relevant for the task: cd run John the Ripper suite contains all sorts of hash extraction utilities. Download the latest release and extract (it should already be installed on Kali Linux, just update packages). We need to extract the hash from the RAR archive. Looks like there is a selection of tools for this Rook, John-the-Ripper, Hashcat, etc. These are the notes/findings from recovering the archived and encrypted files. I've stored sensitive information (2FA recovery codes, etc) in some Roshal archives (RAR) and forgot about them and the exact password.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |