Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CANO7a6wd0YeJJamOOrcLNhT7EZLFua7Em4j2kuf=hHvwjPGppw@mail.gmail.com>
Date: Sat, 8 Sep 2012 00:03:16 +0530
From: Dhiru Kholia <dhiru.kholia@...il.com>
To: john-dev@...ts.openwall.com
Subject: Re: Cracking Mountain Lion hashes (WIP)

On Fri, Sep 7, 2012 at 11:58 PM, Lukas Odzioba <lukas.odzioba@...il.com> wrote:
> 2012/9/7 Dhiru Kholia <dhiru.kholia@...il.com>:
>> This output implies that the actual hash is contained in the first
>> part of 'entropy' field. We now have full information to write a
>> cracker for Mountain Lion hashes.
>
> Great!

>> Can you commit your code for cracking GRUB / Mountain Lion hashes. I
>> will clean-up ml2john.py program and commit it to magnum-jumbo.
>
> Now we have test vector so making patch for it will be easy.
> I'll send it within an hour. Hopefully JtR will be first 10.8 password cracker:)

Cool. Let me know if you need more test vectors. I can generate them tomorrow.

-- 
Cheers,
Dhiru

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.