Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed, 30 Jan 2013 22:02:31 +0100
From: magnum <john.magnum@...hmail.com>
To: john-dev@...ts.openwall.com
Subject: Re: dmg2john

On 30 Jan, 2013, at 21:56 , Jeremiah Grossman <jeremiah@...tehatsec.com> wrote:

> Thanks magnum,
> 
> I pulled the latest code with git clone about an hour ago, substituted your dmg2john.c with the one that came down, and performed "make macosx-x86-64." All successful.
> 
> Created two DMGs for testing. A 200MB AES-256 DMG and a 12GB AES-256 DMG, no data, and simple passphrase. Performed a dmg2john on both. Attached is the output in case someone wants to replicate.
> 
> While I can't speak to the accuracy of the output, the results "look right" to me. Maybe someone is able to confirmed. Either way, the "all-zeros" issue seems to have been resolved.
> 
> We might have a winner here.

Are you saying your test files were successfully cracked? My files aren't. What kind of hardware is this? I strongly suspect my MBPr sets an iteration count other than the hardcoded one in the format. I will fix this.

magnum

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.