Date: Fri, 7 Sep 2012 21:58:58 +0530 From: Dhiru Kholia <dhiru.kholia@...il.com> To: john-dev@...ts.openwall.com Subject: Cracking Mountain Lion hashes (WIP) Hi, Mountain Lion hashes are contained in /private/var/db/dslocal/nodes/Default/users/username.plist files (this information was posted by Lukas earlier). ML-kit.tar (http://dl.dropbox.com/u/1522424/ML-kit.tar.bz2) contains following files: 1. lulu.plist, sample plist obtained from a Mountain Lion system 2. lulu.xml, generated using "plutil -convert xml1 -o /dev/stdout lulu.plist > lulu.xml" command 3. ml2john.py, converts binary plist to usable format, no need of plutil which requires a Mac to work. Now we need to parse the output of ml2john.py program and figure out what the output means i.e. what is the iteration count, what is salt etc. -- Cheers, Dhiru
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.