Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Mon, 23 Apr 2018 04:23:18 -0700
From: Eric Oyen <eric.oyen@...il.com>
To: john-users@...ts.openwall.com
Subject: Re: loading OS X hashes from Davegrohl

ok, I downloaded the last historical version and did a test run with just the plain john command. it did not fail so, now I apply it to the task of cracking one of the files I created.

-eric

PGP fingerprint: 6DFB D6B0 3771 90F1 373E 570C 7EA2 1FF3 6B68 0386

On Apr 23, 2018, at 3:42 AM, Solar Designer wrote:

> On Mon, Apr 23, 2018 at 03:25:40AM -0700, Eric Oyen wrote:
>> ok, I had to do a little google search. A command turned up I can use called dscl. so I used dscl to dump both the salts and hashes for each user on my system. The command went like this: sudo dscl localhost read Search/Users/<username> >> <Username.txt>
> 
> The "dscl" command is what that Perl script uses internally.  I don't
> know why the script would fail for you if the manual command works.
> 
>> this dumped what appears to be proper data into those files. now all I need to do is run the jumbo supported john on them.
> 
> Great.  Right.
> 
> Alexander

Powered by blists - more mailing lists

Your e-mail address:

Powered by Openwall GNU/*/Linux - Powered by OpenVZ