Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CABob6irj12BCaH=NUi+eyD3Dx96U0tP8DC=uLURCkmkAZB9iog@mail.gmail.com>
Date: Fri, 7 Sep 2012 20:12:04 +0200
From: Lukas Odzioba <lukas.odzioba@...il.com>
To: john-dev@...ts.openwall.com
Subject: Re: Cracking Mountain Lion hashes (WIP)

2012/9/7 Dhiru Kholia <dhiru.kholia@...il.com>:
> On Fri, Sep 7, 2012 at 10:59 PM, Alexander Cherepanov <cherepan@...me.ru> wrote:
>> On 07.09.2012 20:28, Dhiru Kholia wrote:
>>> Now we need to parse the output of ml2john.py program and figure out
>>> what the output means i.e. what is the iteration count, what is salt
>>> etc.
>>
>> Well, ShadowHashData field is also plist. Convert it with the same
>> script and you get 'salt', 'entropy' and 'iterations'.
>
> Thanks!, that worked.
>
> Next question, where is the actual pbkdf2 hash? I don't see it.
Can you post it?

If it is pure sha512pbkdf2 it should be consistent with this:

from passlib.hash import grub_pbkdf2_sha512
hash = grub_pbkdf2_sha512.encrypt("password", rounds=10964, salt="salt")
print hash

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.