Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <d2d201dffbb33eabf9e9af0ab833a7ba@smtp.hushmail.com>
Date: Fri, 4 Jan 2013 17:53:13 +0100
From: magnum <john.magnum@...hmail.com>
To: john-dev@...ts.openwall.com
Subject: Re: Cracking Mountain Lion hashes (WIP)

On 4 Jan, 2013, at 17:45 , Dhiru Kholia <dhiru.kholia@...il.com> wrote:
> On Fri, Jan 4, 2013 at 9:56 PM, magnum <john.magnum@...hmail.com> wrote:
>> On 4 Jan, 2013, at 17:03 , Dhiru Kholia <dhiru.kholia@...il.com> wrote:
>>> How does the following output look?
>>> 
>>> ✗ python2 ../run/ml2john.py luser.plist
>>> luser.plist:$pbkdf2-hmac-sha512$(hash):505:20:J Random
>>> Luser,crackable4us:/bin/bash:luser.plist
>> 
>> Great, but you should definitely strip '.plist' from the login name. Actually, you should not take the login field from the filename at all - you should parse it from the payload of the file. With that detail fixed, it's perfect.
> 
> Good point. Fixed and committed the script.

Excellent! I'm very happy with this. You should take great care in every *2john converter, putting anything that can be of value in the GECOS field (or some other appropriate field). I know the pay-off is often huge.

magnum

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.