Date: Fri, 4 Jan 2013 17:53:13 +0100 From: magnum <john.magnum@...hmail.com> To: john-dev@...ts.openwall.com Subject: Re: Cracking Mountain Lion hashes (WIP) On 4 Jan, 2013, at 17:45 , Dhiru Kholia <dhiru.kholia@...il.com> wrote: > On Fri, Jan 4, 2013 at 9:56 PM, magnum <john.magnum@...hmail.com> wrote: >> On 4 Jan, 2013, at 17:03 , Dhiru Kholia <dhiru.kholia@...il.com> wrote: >>> How does the following output look? >>> >>> ✗ python2 ../run/ml2john.py luser.plist >>> luser.plist:$pbkdf2-hmac-sha512$(hash):505:20:J Random >>> Luser,crackable4us:/bin/bash:luser.plist >> >> Great, but you should definitely strip '.plist' from the login name. Actually, you should not take the login field from the filename at all - you should parse it from the payload of the file. With that detail fixed, it's perfect. > > Good point. Fixed and committed the script. Excellent! I'm very happy with this. You should take great care in every *2john converter, putting anything that can be of value in the GECOS field (or some other appropriate field). I know the pay-off is often huge. magnum
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.