So I needed to hack into an unknown key.
Prerequisites:
- Ubuntu windows
- Java installed in the Ubuntu bash
- Install
hashcat -5.0.0 withsudo apt update -y && sudo apt install hashcat -y
Device #1: Not a native Intel OpenCL runtime. Expect massive speed loss.
Ain’t much to it gangsta rap made me do it. Following the README file, Floyd wrote. We should be clear after a few commands lets get to it:
cd
to the JksPrivkPrepate.jar locationjava -jar JksPrivkPrepare.jar your_JKS_file.jks > hash.txt
hashcat -m 15500 -a 3 -1 '?u|' -w 3 hash.txt ?1?1?1?1?1?1?1?1?1 --force
Notice, that I added the –force ^^ flag duo to the “Not a native Intel OpenCL runtime” warning in the Windows bash.
That’s It! all I have to do now is wait
Session..........: hashcat Status...........: Running Hash.Type........: JKS Java Key Store Private Keys (SHA1) Hash.Target......: $jksprivk$*3687106EEA26EE2E599FEF25624011737B851D2F...etools Time.Started.....: Sat Nov 17 13:46:01 2018 (1 hour, 5 mins) Time.Estimated...: Tue Nov 20 01:09:49 2018 (2 days, 10 hours) Guess.Mask.......: ?1?1?1?1?1?1?1?1?1 [9] Guess.Charset....: -1 ?u|, -2 Undefined, -3 Undefined, -4 Undefined Guess.Queue......: 1/1 (100.00%) Speed.Dev.#1.....: 35660.5 kH/s (112.32ms) Recovered........: 0/1 (0.00%) Digests, 0/1 (0.00%) Salts Progress.........: 139568517120/7625597484987 (1.83%) Rejected.........: 0/139568517120 (0.00%) Restore.Point....: 7090176/387420489 (1.83%) Candidates.#1....: YVRNVSUDE -> WDUFBSUDE HWMon.Dev.#1.....: N/A [s]tatus [p]ause [r]esume [b]ypass [c]heckpoint [q]uit =>