Date: Sun, 12 Jan 2014 20:26:48 +0400 From: Solar Designer <solar@...nwall.com> To: john-users@...ts.openwall.com Subject: Re: How to use Wordlists with John The Ripper On Sun, Jan 12, 2014 at 04:24:45PM +0100, magnum wrote: > On 2014-01-12 10:27, NRO117@...il.com wrote: > >It might be important to note that the hash which I'm trying to decrypt is > >from a machine running OS X 10.9.1 Mavericks > > > >Unless I'm mistaken JTR may not yet be functional with 10.9 (?) > > Somewhat unintuitive, the Pro version can not crack OSX hashes afaik JtR Pro for OS X can crack the older OS X hashes, which are salted SHA-1. It can not crack newer OS X hashes yet, which are based on SHA-512. > while the Jumbo version can. Latest bleeding Jumbo, only available as > source code, support over 400 formats/variants including OSX 10.9. Right. It takes bleeding-jumbo to crack 10.9's hashes. However, since NRO117's hash is misidentified as LM, I think there's something else wrong with it (not extracted properly?), so I doubt that even a supporting version of JtR would recognize and crack it. 10.9's hashes should not look like LM even to older versions of JtR (more likely, they wouldn't be detected by older versions at all). Alexander
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.