Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu, 19 Jul 2012 19:13:33 +0200
From: Alex Kornilov <>
Subject: Re: john with Apple Keychains (/Users/Alex/Library/Keychains/login.keychain)

On 7/19/12 6:46 PM, Dhiru Kholia wrote:

thank you for your help
> Which Operating System are you using? You might be able to use
> pre-compiled JtR versions depending on your OS.
OS X Lion
> For cracking OS X Keychains (which you seem to be doing) you need
> jumbo version of john. You can get it from
> After doing "git clone",
> build john, run keychain2john program on login.keychain.bak file and
> then run john on the output of keychain2john.
> Another option is to obtain OS X hashes (using program,
> included with john-jumbo) and crack those to figure out the login
> password. This option will be way faster than trying to crack the
> Keychain.
> (Compile keychain2john using command "gcc keychain2john.c")
this way don't work:

$ ./ /Users/Alex/Library/Keychains/login.keychain.bak
Could not find a Mac OS X 10.7 Lion salted SHA-512 hash in file: 
$ pwd

second try:
$ gcc keychain2john.c
$ ./a.out /Users/Alex/Library/Keychains/login.keychain.bak > /tmp/john
$ john 
--wordlist=/Users/Alex/Downloads/wordlist_john/Wordlists-20031009/all.lst /tmp/john
No password hashes loaded (see FAQ)

also doesn't work.


Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.