Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Sat, 8 Sep 2012 15:56:26 +0400
From: Solar Designer <>
Subject: Re: Cracking Mountain Lion hashes (WIP)


On Sat, Sep 08, 2012 at 05:08:29PM +0530, Dhiru Kholia wrote:
> Format : filename:$ml$iterations$salt$hash

This looks much better to me.  Thank you!

Instead of "ml", should we possibly use "PBKDF2-HMAC-SHA-512"?  Would
this format be directly usable for other uses of PBKDF2-HMAC-SHA-512 in
other products, or is there some detail specific to Mountain Lion?

> More samples can be obtained from
> The passwords which I
> have used are "applecrap", "password", "testpassword" and "overlord
> magnum".

Can you be uploading these to our wiki instead of to Dropbox, please?
This specific file should be on:

in the "Sample password hash files" section, although you'd need to add
some explanation that a *2john program needs to be run on the *.plist
files first.

Thanks again,


Powered by blists - more mailing lists

Your e-mail address:

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.