Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Sat, 8 Sep 2012 15:56:26 +0400
From: Solar Designer <solar@...nwall.com>
To: john-dev@...ts.openwall.com
Subject: Re: Cracking Mountain Lion hashes (WIP)

Dhiru,

On Sat, Sep 08, 2012 at 05:08:29PM +0530, Dhiru Kholia wrote:
> Format : filename:$ml$iterations$salt$hash

This looks much better to me.  Thank you!

Instead of "ml", should we possibly use "PBKDF2-HMAC-SHA-512"?  Would
this format be directly usable for other uses of PBKDF2-HMAC-SHA-512 in
other products, or is there some detail specific to Mountain Lion?

> More samples can be obtained from
> http://dl.dropbox.com/u/1522424/ML-kit-v2.zip. The passwords which I
> have used are "applecrap", "password", "testpassword" and "overlord
> magnum".

Can you be uploading these to our wiki instead of to Dropbox, please?
This specific file should be on:

http://openwall.info/wiki/john/sample-hashes

in the "Sample password hash files" section, although you'd need to add
some explanation that a *2john program needs to be run on the *.plist
files first.

Thanks again,

Alexander

Powered by blists - more mailing lists

Your e-mail address:

Powered by Openwall GNU/*/Linux - Powered by OpenVZ