Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Sun, 12 Jan 2014 22:21:24 +0400
From: Solar Designer <solar@...nwall.com>
To: john-users@...ts.openwall.com
Subject: Re: How to use Wordlists with John The Ripper

On Sun, Jan 12, 2014 at 09:56:41AM -0800, C GPS wrote:
> I extracted the hash by going into single user mode on my locked machine,
> creating a root account and then running DaveGrohl to extract. The hash
> that came out was very long. The short version that you see is my attempt
> at disambiguating it per the instructions given in an instructional
> tutorial on extracting hashes from 10.8. It is named sha1.txt only because
> I named them that as again instructed by the aforementioned tutorial.
> 
> Below is the complete hash without username: (I don't mind posting it
> because the machine is not currently on-line). I'll be curious to know if
> the clears anything up.

Sure.  bleeding-jumbo loads this hash just fine:

Loaded 1 password hash (PBKDF2-HMAC-SHA512, GRUB2 / OS X 10.8+ [PBKDF2-SHA512 128/128 SSE4.1 2x])

You may get the bleeding-jumbo source code at:

https://github.com/magnumripper/JohnTheRipper/tarball/bleeding-jumbo

Alexander

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.