Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Sun, 12 Jan 2014 20:26:48 +0400
From: Solar Designer <>
Subject: Re: How to use Wordlists with John The Ripper

On Sun, Jan 12, 2014 at 04:24:45PM +0100, magnum wrote:
> On 2014-01-12 10:27, wrote:
> >It might be important to note that the hash which I'm trying to decrypt is 
> >from a machine running OS X 10.9.1 Mavericks
> >
> >Unless I'm mistaken JTR may not yet be functional with 10.9 (?)
> Somewhat unintuitive, the Pro version can not crack OSX hashes afaik 

JtR Pro for OS X can crack the older OS X hashes, which are salted
SHA-1.  It can not crack newer OS X hashes yet, which are based on

> while the Jumbo version can. Latest bleeding Jumbo, only available as 
> source code, support over 400 formats/variants including OSX 10.9.

Right.  It takes bleeding-jumbo to crack 10.9's hashes.

However, since NRO117's hash is misidentified as LM, I think there's
something else wrong with it (not extracted properly?), so I doubt that
even a supporting version of JtR would recognize and crack it.  10.9's
hashes should not look like LM even to older versions of JtR (more
likely, they wouldn't be detected by older versions at all).


Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.