Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri, 4 Jan 2013 22:15:33 +0530
From: Dhiru Kholia <dhiru.kholia@...il.com>
To: john-dev@...ts.openwall.com
Subject: Re: Cracking Mountain Lion hashes (WIP)

On Fri, Jan 4, 2013 at 9:56 PM, magnum <john.magnum@...hmail.com> wrote:
> On 4 Jan, 2013, at 17:03 , Dhiru Kholia <dhiru.kholia@...il.com> wrote:
>> How does the following output look?
>>
>> ✗ python2 ../run/ml2john.py luser.plist
>> luser.plist:$pbkdf2-hmac-sha512$(hash):505:20:J Random
>> Luser,crackable4us:/bin/bash:luser.plist
>
> Great, but you should definitely strip '.plist' from the login name. Actually, you should not take the login field from the filename at all - you should parse it from the payload of the file. With that detail fixed, it's perfect.

Good point. Fixed and committed the script.

-- 
Dhiru

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.