Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Fri, 7 Sep 2012 21:58:58 +0530
From: Dhiru Kholia <dhiru.kholia@...il.com>
To: john-dev@...ts.openwall.com
Subject: Cracking Mountain Lion hashes (WIP)

Hi,

Mountain Lion hashes are contained in
/private/var/db/dslocal/nodes/Default/users/username.plist files (this
information was posted by Lukas earlier).

ML-kit.tar (http://dl.dropbox.com/u/1522424/ML-kit.tar.bz2) contains
following files:

1. lulu.plist, sample plist obtained from a Mountain Lion system
2. lulu.xml, generated using "plutil -convert xml1 -o /dev/stdout
lulu.plist > lulu.xml" command
3. ml2john.py, converts binary plist to usable format, no need of
plutil which requires a Mac to work.

Now we need to parse the output of ml2john.py program and figure out
what the output means i.e. what is the iteration count, what is salt
etc.

-- 
Cheers,
Dhiru

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.