Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Sun, 12 Jan 2014 11:48:57 -0800
From: C GPS <>
Subject: Re: How to use Wordlists with John The Ripper

One final question and thanks for all of your help thus far.  I've learned
a lot with this thread.

What disambiguated hash did you load? In other words I know one doesn't
load the long form hash as I entered it above, and the disambiguations I've
come up with seem to be incorrect. Can you tell me the short form you

Thanks again.

On Sun, Jan 12, 2014 at 10:21 AM, Solar Designer <> wrote:

> On Sun, Jan 12, 2014 at 09:56:41AM -0800, C GPS wrote:
> > I extracted the hash by going into single user mode on my locked machine,
> > creating a root account and then running DaveGrohl to extract. The hash
> > that came out was very long. The short version that you see is my attempt
> > at disambiguating it per the instructions given in an instructional
> > tutorial on extracting hashes from 10.8. It is named sha1.txt only
> because
> > I named them that as again instructed by the aforementioned tutorial.
> >
> > Below is the complete hash without username: (I don't mind posting it
> > because the machine is not currently on-line). I'll be curious to know if
> > the clears anything up.
> Sure.  bleeding-jumbo loads this hash just fine:
> Loaded 1 password hash (PBKDF2-HMAC-SHA512, GRUB2 / OS X 10.8+
> [PBKDF2-SHA512 128/128 SSE4.1 2x])
> You may get the bleeding-jumbo source code at:
> Alexander

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.