Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri, 7 Sep 2012 23:52:01 +0530
From: Dhiru Kholia <>
Subject: Re: Cracking Mountain Lion hashes (WIP)

On Fri, Sep 7, 2012 at 11:42 PM, Lukas Odzioba <> wrote:
> 2012/9/7 Dhiru Kholia <>:
>> On Fri, Sep 7, 2012 at 10:59 PM, Alexander Cherepanov <> wrote:
>>> On 07.09.2012 20:28, Dhiru Kholia wrote:
>>>> Now we need to parse the output of program and figure out
>>>> what the output means i.e. what is the iteration count, what is salt
>>>> etc.
>>> Well, ShadowHashData field is also plist. Convert it with the same
>>> script and you get 'salt', 'entropy' and 'iterations'.
>> Thanks!, that worked.
>> Next question, where is the actual pbkdf2 hash? I don't see it.
> Can you post it?

See attached code and earlier archive (use lulu.plist from it)


> If it is pure sha512pbkdf2 it should be consistent with this:
> from passlib.hash import grub_pbkdf2_sha512
> hash = grub_pbkdf2_sha512.encrypt("password", rounds=10964, salt="salt")
> print hash

Great. This works!


This output implies that the actual hash is contained in the first
part of 'entropy' field. We now have full information to write a
cracker for Mountain Lion hashes.


Can you commit your code for cracking GRUB / Mountain Lion hashes. I
will clean-up program and commit it to magnum-jumbo.


Download attachment "" of type "application/octet-stream" (37942 bytes)

Powered by blists - more mailing lists

Your e-mail address:

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.