Date: Fri, 4 Jan 2013 21:41:13 +0530 From: Dhiru Kholia <dhiru.kholia@...il.com> To: john-dev@...ts.openwall.com Subject: Re: Cracking Mountain Lion hashes (WIP) On Fri, Jan 4, 2013 at 9:33 PM, Dhiru Kholia <dhiru.kholia@...il.com> wrote: > On Fri, Jan 4, 2013 at 8:57 PM, magnum <john.magnum@...hmail.com> wrote: >> As discussed earlier in this thread, it should ideally be more like this, and possibly more: >> >> luser:(hash):505:20:J Random Luser,crackable4us:/Users/luser:/bin/bash:../../luser.plist >> >> The former format would never be cracked at this speed, but the latter format would, immediately, by Single mode because "crackable4us" is the password hint given for this user (and a very good one, lol). Also, the full path of the input file is placed last, in a field that Single mode does NOT read. ✗ python2 ../run/ml2john.py magnum.plist magnum.plist:$pbkdf2-hmac-sha512$(hash):503:20:magnum,overlord magnum:/bin/bash:magnum.plist You can use http://openwall.info/wiki/_media/john/ML-hashes.zip to generate the full hash. This hash doesn't get cracked by single mode. The password is "overlord magnum" which is present in the GECOS field. I guess single mode treats strings separated by a space as multiple passwords. -- Dhiru
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.