Best suited is the precompiled MacOS version. Install Johnįirst you need to install ' John the Ripper' (JtR). In this case, you can use John The Ripper to brute-force the disk images hash value via a wordlist and rules. Prerequisite is that you do have an idea about what the password may look like, if you can guess most of it's text elements, but something was added or you cannot remember the exact password any more.Ī situation like this: MotherShip:~ akira$ hdiutil attach -readonly -nomount Desktop/Secrets.sparsebundle Enter password to access 'Secrets.sparsebundle': hdiutil: attach failed - Authentication error The approach also works with sparseimage files using AES 128 or 256 bit encryption, as used by MaxOS Sierra 10.12. This receipe shows how to brute-force open a MacOSX disk image with encryption set if you cannot remember the password any more.