Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri, 4 Jan 2013 17:53:13 +0100
From: magnum <>
Subject: Re: Cracking Mountain Lion hashes (WIP)

On 4 Jan, 2013, at 17:45 , Dhiru Kholia <> wrote:
> On Fri, Jan 4, 2013 at 9:56 PM, magnum <> wrote:
>> On 4 Jan, 2013, at 17:03 , Dhiru Kholia <> wrote:
>>> How does the following output look?
>>> ✗ python2 ../run/ luser.plist
>>> luser.plist:$pbkdf2-hmac-sha512$(hash):505:20:J Random
>>> Luser,crackable4us:/bin/bash:luser.plist
>> Great, but you should definitely strip '.plist' from the login name. Actually, you should not take the login field from the filename at all - you should parse it from the payload of the file. With that detail fixed, it's perfect.
> Good point. Fixed and committed the script.

Excellent! I'm very happy with this. You should take great care in every *2john converter, putting anything that can be of value in the GECOS field (or some other appropriate field). I know the pay-off is often huge.


Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.