Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Date: Wed, 18 Jul 2012 16:44:12 +0530
From: Dhiru Kholia <>
Subject: Re: [Pauldotcom] john with Apple Keychains (/Users/Alex/Library/Keychains/login.keychain)

On Tue, Jul 17, 2012 at 11:48 PM, Alex Kornilov <> wrote:
> I try to "crack" my OS X login password.
> $ john
> --wordlist=/Users/Alex/Downloads/wordlist_john/Wordlists-20031009/all.lst
> login.keychain.bak
> $ john -show login.keychain.bak
> 0 password hashes cracked, 1 left
> what I am doing wrong?

Hi Alex,

Please bring this discussion to "john-users" mailing list where you
will find john related answers.

In short,

For cracking OS X Keychains (which you seem to be doing) you need
jumbo version of john. You can get it from After doing "git clone",
build john, run keychain2john program on login.keychain.bak file and
then run john on the output of keychain2john.

Another option is to obtain OS X hashes (using program,
included with john-jumbo) and crack those to figure out the login
password. This option will be way faster than trying to crack the


Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.