|
Message-ID: <CANO7a6zUMKdOncKB2EZC9wU+HF1TB7N=uCPmkj8xpt+5A-2UuA@mail.gmail.com> Date: Fri, 4 Jan 2013 22:15:33 +0530 From: Dhiru Kholia <dhiru.kholia@...il.com> To: john-dev@...ts.openwall.com Subject: Re: Cracking Mountain Lion hashes (WIP) On Fri, Jan 4, 2013 at 9:56 PM, magnum <john.magnum@...hmail.com> wrote: > On 4 Jan, 2013, at 17:03 , Dhiru Kholia <dhiru.kholia@...il.com> wrote: >> How does the following output look? >> >> ✗ python2 ../run/ml2john.py luser.plist >> luser.plist:$pbkdf2-hmac-sha512$(hash):505:20:J Random >> Luser,crackable4us:/bin/bash:luser.plist > > Great, but you should definitely strip '.plist' from the login name. Actually, you should not take the login field from the filename at all - you should parse it from the payload of the file. With that detail fixed, it's perfect. Good point. Fixed and committed the script. -- Dhiru
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.