Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CABob6ioGA5_dHoZn_O5K_-i27Mu4OqxwU_2im7m1nnwGWoP1tg@mail.gmail.com>
Date: Fri, 7 Sep 2012 20:38:06 +0200
From: Lukas Odzioba <lukas.odzioba@...il.com>
To: john-dev@...ts.openwall.com
Subject: Re: Cracking Mountain Lion hashes (WIP)

2012/9/7 Dhiru Kholia <dhiru.kholia@...il.com>:
> On Fri, Sep 7, 2012 at 11:58 PM, Lukas Odzioba <lukas.odzioba@...il.com> wrote:
>> 2012/9/7 Dhiru Kholia <dhiru.kholia@...il.com>:
>>> This output implies that the actual hash is contained in the first
>>> part of 'entropy' field. We now have full information to write a
>>> cracker for Mountain Lion hashes.
>>
>> Great!
>
>>> Can you commit your code for cracking GRUB / Mountain Lion hashes. I
>>> will clean-up ml2john.py program and commit it to magnum-jumbo.
>>
>> Now we have test vector so making patch for it will be easy.
>> I'll send it within an hour. Hopefully JtR will be first 10.8 password cracker:)
>
> Cool. Let me know if you need more test vectors. I can generate them tomorrow.

Can you make changes to ml2john.py so it will out ciphertext
exctracted from shadowhash field?

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.