|
Message-ID: <f8ae6a165b45a2e2dd8876d6a96b1df2@smtp.hushmail.com> Date: Wed, 30 Jan 2013 22:02:31 +0100 From: magnum <john.magnum@...hmail.com> To: john-dev@...ts.openwall.com Subject: Re: dmg2john On 30 Jan, 2013, at 21:56 , Jeremiah Grossman <jeremiah@...tehatsec.com> wrote: > Thanks magnum, > > I pulled the latest code with git clone about an hour ago, substituted your dmg2john.c with the one that came down, and performed "make macosx-x86-64." All successful. > > Created two DMGs for testing. A 200MB AES-256 DMG and a 12GB AES-256 DMG, no data, and simple passphrase. Performed a dmg2john on both. Attached is the output in case someone wants to replicate. > > While I can't speak to the accuracy of the output, the results "look right" to me. Maybe someone is able to confirmed. Either way, the "all-zeros" issue seems to have been resolved. > > We might have a winner here. Are you saying your test files were successfully cracked? My files aren't. What kind of hardware is this? I strongly suspect my MBPr sets an iteration count other than the hardcoded one in the format. I will fix this. magnum
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.