Android KeyStore hacking with Windows “Expect massive speed loss”

  • 256
  • 0

So I needed to hack into an unknown key.jks file. Got the “JKS private key cracker – Nail in the JKS coffin” Repo from Github. And used the ubuntu system installed in my windows.

Prerequisites:

  1. Ubuntu windows
  2. Java installed in the Ubuntu bash
  3. Install hashcat-5.0.0 with sudo apt update -y && sudo apt install hashcat -y Device #1: Not a native Intel OpenCL runtime. Expect massive speed loss.

Ain’t much to it gangsta rap made me do it. Following the README file, Floyd wrote. We should be clear after a few commands lets get to it: 

  1. cd to the JksPrivkPrepate.jar location
  2. java -jar JksPrivkPrepare.jar your_JKS_file.jks > hash.txt
  3. hashcat -m 15500 -a 3 -1 '?u|' -w 3 hash.txt ?1?1?1?1?1?1?1?1?1 --force
    Notice, that I added the –force ^^ flag duo to the “Not a native Intel OpenCL runtime” warning in the Windows bash.

That’s It! all I have to do now is wait

Session..........: hashcat
Status...........: Running
Hash.Type........: JKS Java Key Store Private Keys (SHA1)
Hash.Target......: $jksprivk$*3687106EEA26EE2E599FEF25624011737B851D2F...etools
Time.Started.....: Sat Nov 17 13:46:01 2018 (1 hour, 5 mins)
Time.Estimated...: Tue Nov 20 01:09:49 2018 (2 days, 10 hours)
Guess.Mask.......: ?1?1?1?1?1?1?1?1?1 [9]
Guess.Charset....: -1 ?u|, -2 Undefined, -3 Undefined, -4 Undefined
Guess.Queue......: 1/1 (100.00%)
Speed.Dev.#1.....: 35660.5 kH/s (112.32ms)
Recovered........: 0/1 (0.00%) Digests, 0/1 (0.00%) Salts
Progress.........: 139568517120/7625597484987 (1.83%)
Rejected.........: 0/139568517120 (0.00%)
Restore.Point....: 7090176/387420489 (1.83%)
Candidates.#1....: YVRNVSUDE -> WDUFBSUDE
HWMon.Dev.#1.....: N/A

[s]tatus [p]ause [r]esume [b]ypass [c]heckpoint [q]uit =>

Add Comment

Your email address will not be published. Required fields are marked *