|
Message-ID: <20120401060406.GA3825@openwall.com> Date: Sun, 1 Apr 2012 10:04:06 +0400 From: Solar Designer <solar@...nwall.com> To: john-dev@...ts.openwall.com Subject: Mac OS X keychains and FileVault (was: GSoC non-hash office documents) On Sun, Apr 01, 2012 at 11:08:51AM +0530, Dhiru Kholia wrote: > Which "other tools" for cracking Mac OS X keychains and FileVault are you > talking about? Are their sources published? My search earlier could't find > such tools. http://www.ucc.asn.au/~matt/src/ - extractkeychain-0.1.tar.gz http://www.georgestarcher.com/?page_id=256 - crowbarDMG, crowbarKC "VileFault decrypts encrypted Mac OS X disk image files. It supports both version 1 and 2 of the non-documented proprietary format." http://code.google.com/p/vilefault/ http://crypto.nsa.org/vilefault/ - broken link? http://openciphers.sourceforge.net/oc/vfcrack.php - FPGA implementation There's also my own tiny keychain cracker that runs on Mac only and uses SecKeychainUnlock() to test various passwords (about 200 c/s at 2.0 GHz, does not scale beyond 1 CPU core because of locking in the system). I did not release it. I also have some related notes. I can share this stuff with whoever works on implementing this for JtR. http://www.google.com/search?q=allinurl:BLOBFORMAT+Apple&hl=en&prmd=ivns&filter=0 http://opensource.apple.com/source/Security/Security-54.1.7/SecurityServer/BLOBFORMAT?f=text Alexander
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.