|
Message-ID: <CABob6ioGA5_dHoZn_O5K_-i27Mu4OqxwU_2im7m1nnwGWoP1tg@mail.gmail.com> Date: Fri, 7 Sep 2012 20:38:06 +0200 From: Lukas Odzioba <lukas.odzioba@...il.com> To: john-dev@...ts.openwall.com Subject: Re: Cracking Mountain Lion hashes (WIP) 2012/9/7 Dhiru Kholia <dhiru.kholia@...il.com>: > On Fri, Sep 7, 2012 at 11:58 PM, Lukas Odzioba <lukas.odzioba@...il.com> wrote: >> 2012/9/7 Dhiru Kholia <dhiru.kholia@...il.com>: >>> This output implies that the actual hash is contained in the first >>> part of 'entropy' field. We now have full information to write a >>> cracker for Mountain Lion hashes. >> >> Great! > >>> Can you commit your code for cracking GRUB / Mountain Lion hashes. I >>> will clean-up ml2john.py program and commit it to magnum-jumbo. >> >> Now we have test vector so making patch for it will be easy. >> I'll send it within an hour. Hopefully JtR will be first 10.8 password cracker:) > > Cool. Let me know if you need more test vectors. I can generate them tomorrow. Can you make changes to ml2john.py so it will out ciphertext exctracted from shadowhash field?
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.