## ❕NEWS – John Cantrell hacked a BTC address as part of a Twitter contest | Proxies123.com

It is best to store bitcoins in a paper wallet. To do this, you can download a special open source program from the Internet, which generates a secret key, a public key and based on the address of the wallet. this program must be compiled and run on a computer that is not connected to the Internet. and it will generate you a secret key that cannot be picked up faster than 1000 years. Then you send your bitcoins to this newly generated wallet and no one will be able to get them except you!

## How does john the ripper crack hashes using wordlists?

How does John The Ripper work when trying to crack passphrase of a private ssh key? As in what steps are involved when it tries to do so? What’s the role of ssh2john in the whole process?

## mg.metric geometry – Are the John ellipsoids for the absolutely separable two-qubit states, the inscribed and circumscribed hypersphere?

Let us denote and order the four non-negative eigenvalues of a (by definition, $$4 times 4$$, Hermitian, nonnegative definite, trace one) “two-qubit density matrix” as
$$begin{equation} 1 geq x geq y geq z geq (1-x-y-z) geq 0. end{equation}$$
The set ($$S$$) of absolutely separable states (those that can not be “entangled” by global unitary transformations) is defined by the additional inequality (eq. (1)) Halder
$$begin{equation} x – z leq 2 sqrt{y (1-x-y-z)}. end{equation}$$
The maximal (inscribed) ball contained within $$S$$ is composed of the points for which
$$begin{equation} x^2 +y^2 +z^2 +(1-x-y-z)^2 leq frac{1}{3}, end{equation}$$
while the minimal (circumscribed) ball containing $$S$$ is composed of the points for which
$$begin{equation} x^2 +y^2 +z^2 +(1-x-y-z)^2 leq frac{3}{8}. end{equation}$$

So, let us pose the question of whether or not the John ellipsoids JohnEllipoids containing and contained within the set $$S$$ of absolutely separable two-qubit states are simply the inscribed and circumscribed 4-balls indicated above? (cf. 9and15D)

Let us point out that in the answer to 4-ball, we report formulas for the Hilbert-Schmidt probabilities (relative volumes) of the inscribed and circumscribed two balls, that is,
$$begin{equation} frac{35 pi }{23328 sqrt{3}} approx 0.00272132 end{equation}$$
and the considerably larger
$$begin{equation} frac{35 sqrt{frac{1}{3} left(2692167889921345-919847607929856 sqrt{6}right)} pi}{27518828544} approx 0.0483353. end{equation}$$

Further, in AbsSepVol
the formula for the Hilbert-Schmidt volume
$$begin{equation} frac{29902415923}{497664}-frac{50274109}{512 sqrt{2}}-frac{3072529845 pi }{32768 sqrt{2}}+frac{1024176615 cos ^{-1}left(frac{1}{3}right)}{4096 sqrt{2}} approx 0.00365826 end{equation}$$
of the intermediate absolutely separable set $$S$$ has been given.

Parallel analyses to those discussed above for two-qubit systems do not appear computationally feasible for the next higher-dimensional “qubit-qutrit” systems–for which the density matrices are $$6 times 6$$ QubitQutrit.

## ❕NEWS – John McAffe got arrested after he’s caught avoiding tax and endorsing several ICOs | Proxies123.com

As reported by Bitcoin.com, John McAfee, a once avid Bitcoin supporter turned hater has been arrested by the US’s department of justice. The reasons of his arrest is that he secretly promoted to his Twitter follower several crypto initial coins offering without disclosing the fact that he’s actually being paid to endorse those offerings. Not only that, he’s also being charged because of tax avoidance.

## John the ripper – rar

I’m trying to crack my own RAR password. Why when I run the rar2john <rarfile> I’m getting the message:

## Can’t open hash with John or Hashcat

I’m trying to open a hash with John and HashCat, but both don’t work?

NTLMv2 Response Captured from 192.168.1.1
DOMAIN: DEV29-APP01 USER: testuser
LMHASH:Disabled LM_CLIENT_CHALLENGE:Disabled
NTHASH:3045e74dac0653865d353e93e8c5ca8c

Manually rewritten to:

me>hashcat -m 5600 -a 3 testuser.txt --force
Hashfile 'testuser.txt' on line 1 (testus...31003400330033000000000000000000): Separator unmatched

me>john --format=netntlmv2 testuser.txt
Using default input encoding: UTF-8
me>john --show --format=netntlmv2 testuser.txt
0 password hashes cracked, 0 left

What am I missing?

## hash – How to apply custom filters for John The Ripper when cracking RAR3 archive password?

My problem is that I’m trying to crack RAR file with is encrypted with RAR3 encryption.
Decided to try with John The Ripper.
Here are clues I have from my friend.

1. Max password length is 8
2. Only capital letters or digits

And I need now filter to make John crack the password without trying to check small lowercase letters.
On hashcat it’s easy to do but program do not support \$RAR3\$*1 type of hashes.

## john the ripper – Decrypting a password-protected 7z file with Delta filter fails

I have made a 7z archive using Delta filter containing a wav file and I have protected it with a password. I am running a terminal in Kali Linux. My problem is that I cannot get the password cracked using 7z2john.pl and john the ripper. If I omit the Delta compression, using only the default compression of 7z, then the cracking succeeds. My question: is it possible to use 7z2john.pl and john the ripper to crack a password-protected 7z file with Delta compression? If it is possible, how can it be done?

Here are the steps to reproduce the problem:

1. I use the following command to create the archive:

7z a test.7z *.wav -mf=Delta:4 -peasy

I get this output:

7-Zip (64) 16.02 : Copyright (c) 1999-2016 Igor Pavlov : 2016-05-21
p7zip Version 16.02 (locale=fi_FI.utf8,Utf16=on,HugeFiles=on,64 bits,4 CPUs Intel(R) Core(TM) i5-4460  CPU @ 3.20GHz (306C3),ASM,AES-NI)

Open archive: test.7z
--
Path = test.7z
Type = 7z
Physical Size = 1090
Method = Delta LZMA2:15 7zAES
Solid = -
Blocks = 1

Scanning the drive:
1 file, 32080 bytes (32 KiB)

Updating archive: test.7z

Items to compress: 1

Archive size: 1090 bytes (2 KiB)
Everything is Ok

1. I use 7z2john.pl to generate material for John the Ripper to crack the archive:

/usr/share/john/7z2john.pl test.7z > test.hash

1. I create a word list file containing only the password I gave to the archive:

echo easy > wordlist.txt

Then I try to decrypt the file:

sudo john test.hash --wordlist=wordlist.txt

I get the following output:

Using default input encoding: UTF-8
Cost 1 (iteration count) is 524288 for all loaded hashes
Cost 3 (compression type) is 2 for all loaded hashes
Press 'q' or Ctrl-C to abort, almost any other key for status
Warning: Only 1 candidate left, minimum 32 needed for performance.
0g 0:00:00:00 DONE (2020-08-15 07:37) 0g/s 5.555p/s 5.555c/s 5.555C/s easy
Session completed
1. I check if the password has been cracked:
sudo john --show test.hash

I get the following output:

0 password hashes cracked, 1 left

So it seems that the decrypting did not succeed. However, I can extract the archive using command 7z e test.7z -peasy so the password should be correct. Also, if I create the archive without specifying the Delta filter using command 7z a test.7z *.wav -peasy. That way, by repeating the steps 1-4 I get the password cracked and am shown the result that the correct password has been found:

\$ 7z a test.7z *.wav -peasy

7-Zip (64) 16.02 : Copyright (c) 1999-2016 Igor Pavlov : 2016-05-21
p7zip Version 16.02 (locale=fi_FI.utf8,Utf16=on,HugeFiles=on,64 bits,4 CPUs Intel(R) Core(TM) i5-4460  CPU @ 3.20GHz (306C3),ASM,AES-NI)

Scanning the drive:
1 file, 32080 bytes (32 KiB)

Creating archive: test.7z

Items to compress: 1

Archive size: 1058 bytes (2 KiB)
Everything is Ok

\$ /usr/share/john/7z2john.pl test.7z > test.hash
\$ echo easy >> wordlist.txt
\$ sudo john test.hash --wordlist=wordlist.txt
Using default input encoding: UTF-8
Cost 1 (iteration count) is 524288 for all loaded hashes
Cost 3 (compression type) is 2 for all loaded hashes
Press 'q' or Ctrl-C to abort, almost any other key for status
Warning: Only 1 candidate left, minimum 32 needed for performance.
easy             (test.7z)
1g 0:00:00:00 DONE (2020-08-15 07:49) 5.263g/s 5.263p/s 5.263c/s 5.263C/s easy
Use the "--show" option to display all of the cracked passwords reliably
Session completed
\$ sudo john --show test.hash
test.7z:easy

1 password hash cracked, 0 left

## passwords – John The Ripper and PBKDF2-HMAC-SHA1

I am trying to hash a list of passwords with PBKDF2-HMAC-SHA1 and then crack them using John. However, John does not recognise the hashes and I get a No Hashes Found error. It works with SHA256, but I need PBKDF2-HMAC-SHA1. I have looked everywhere and have exhausted all my options. What is the correct format of PBKDF2-HMAC-SHA1 that is recognised by John and will let me crack it? Thanks in advance!

## Getting an error when running John The Ripper on 7zip file

I’ve never really worked with this tool, John Jumbo 1.9. I’m just curious since people say 7zip is a secure way of encrypting files, so I wanted to try it myself. Anyways, I encrypted a file with 7z, and installed john-jumbo on my machine running macOS Catalina. I wanted to get the hash of the file, so I ran john 7z2john.pl file.7z > ~/Desktop/file.hash attempting to get the hash of the file. However, when I ran it, I got the following error:

Warning: detected hash type "HMAC-SHA256", but the string is also recognized as "HMAC-SHA512"