|
Message-ID: <CANO7a6wd0YeJJamOOrcLNhT7EZLFua7Em4j2kuf=hHvwjPGppw@mail.gmail.com> Date: Sat, 8 Sep 2012 00:03:16 +0530 From: Dhiru Kholia <dhiru.kholia@...il.com> To: john-dev@...ts.openwall.com Subject: Re: Cracking Mountain Lion hashes (WIP) On Fri, Sep 7, 2012 at 11:58 PM, Lukas Odzioba <lukas.odzioba@...il.com> wrote: > 2012/9/7 Dhiru Kholia <dhiru.kholia@...il.com>: >> This output implies that the actual hash is contained in the first >> part of 'entropy' field. We now have full information to write a >> cracker for Mountain Lion hashes. > > Great! >> Can you commit your code for cracking GRUB / Mountain Lion hashes. I >> will clean-up ml2john.py program and commit it to magnum-jumbo. > > Now we have test vector so making patch for it will be easy. > I'll send it within an hour. Hopefully JtR will be first 10.8 password cracker:) Cool. Let me know if you need more test vectors. I can generate them tomorrow. -- Cheers, Dhiru
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.