View Single Post
Posts: 458 | Thanked: 783 times | Joined on Jan 2010 @ France
#371
Hi all,

I have finally packaged properly 'John The Ripper' for our device ...

Download packages from extra-devel :

Activate all repositories following this tutorial : http://thenokiablog.com/2009/10/27/m...-applications/

Then, as usual, as root, install with :

Code:
-bash-2.05b# apt-get install john && john
Reading package lists... Done
Building dependency tree       
Reading state information... Done
Suggested packages:
  wordlist
The following NEW packages will be installed:
  john
0 upgraded, 1 newly installed, 0 to remove and 23 not upgraded.
Need to get 0B/811kB of archives.
After this operation, 1430kB of additional disk space will be used.
Selecting previously deselected package john.
(Reading database ... 39392 files and directories currently installed.)
Unpacking john (from .../john_1.7.8-1maemo6_armel.deb) ...
Setting up john (1.7.8-1maemo6) ...
John the Ripper password cracker, version 1.7.8
Copyright (c) 1996-2011 by Solar Designer
Homepage: http://www.openwall.com/john/

Usage: john [OPTIONS] [PASSWORD-FILES]
--single                   "single crack" mode
--wordlist=FILE --stdin    wordlist mode, read words from FILE or stdin
--rules                    enable word mangling rules for wordlist mode
--incremental[=MODE]       "incremental" mode [using section MODE]
--external=MODE            external mode or word filter
--stdout[=LENGTH]          just output candidate passwords [cut at LENGTH]
--restore[=NAME]           restore an interrupted session [called NAME]
--session=NAME             give a new session the NAME
--status[=NAME]            print status of a session [called NAME]
--make-charset=FILE        make a charset, FILE will be overwritten
--show                     show cracked passwords
--test[=TIME]              run tests and benchmarks for TIME seconds each
--users=[-]LOGIN|UID[,..]  [do not] load this (these) user(s) only
--groups=[-]GID[,..]       load users [not] of this (these) group(s) only
--shells=[-]SHELL[,..]     load users with[out] this (these) shell(s) only
--salts=[-]COUNT           load salts with[out] at least COUNT passwords only
--format=NAME              force hash type NAME: DES/BSDI/MD5/BF/AFS/LM
--save-memory=LEVEL        enable memory saving, at LEVEL 1..3
-bash-2.05b#
Ok, now we have 'John The Ripper' properly installed then it's time to crack the Security Code of the device.

To ease the cracking process I have made a shell script you can launch :

Code:
-bash-2.05b# wget "http://bigbob.fun.free.fr/maemo/Nokia-N900-Security-Code-Recover"
--05:54:09--  http://bigbob.fun.free.fr/maemo/Nokia-N900-Security-Code-Recover
           => `Nokia-N900-Security-Code-Recover'
Résolution de bigbob.fun.free.fr... 212.27.63.102
Connexion vers bigbob.fun.free.fr|212.27.63.102|:80...connecté.
requête HTTP transmise, en attente de la réponse...200 OK
Longueur: 2 220 (2.2K) [text/plain]

100%[=================================================================================================================>] 2 220         --.--K/s             

05:54:09 (1.51 MB/s) - « Nokia-N900-Security-Code-Recover » sauvegardé [2220/2220]

-bash-2.05b# chmod +x Nokia-N900-Security-Code-Recover 
-bash-2.05b# ./Nokia-N900-Security-Code-Recover
Hope it help ...

A++
 

The Following User Says Thank You to colin.stephane For This Useful Post: