Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <C3216A6C-7DC5-4E0C-8B3C-705A2382D15D@whitehatsec.com>
Date: Wed, 30 Jan 2013 21:25:55 +0000
From: Jeremiah Grossman <jeremiah@...tehatsec.com>
To: "john-dev@...ts.openwall.com" <john-dev@...ts.openwall.com>
Subject: Re: dmg2john


On Jan 30, 2013, at 1:02 PM, magnum <john.magnum@...hmail.com> wrote:

> On 30 Jan, 2013, at 21:56 , Jeremiah Grossman <jeremiah@...tehatsec.com> wrote:
> 
>> Thanks magnum,
>> 
>> I pulled the latest code with git clone about an hour ago, substituted your dmg2john.c with the one that came down, and performed "make macosx-x86-64." All successful.
>> 
>> Created two DMGs for testing. A 200MB AES-256 DMG and a 12GB AES-256 DMG, no data, and simple passphrase. Performed a dmg2john on both. Attached is the output in case someone wants to replicate.
>> 
>> While I can't speak to the accuracy of the output, the results "look right" to me. Maybe someone is able to confirmed. Either way, the "all-zeros" issue seems to have been resolved.
>> 
>> We might have a winner here.
> 
> Are you saying your test files were successfully cracked? My files aren't. What kind of hardware is this? I strongly suspect my MBPr sets an iteration count other than the hardcoded one in the format. I will fix this.
> 
> magnum


I didn't crack them, just ran dmg2john, captured the output and stopped there. I can take the next step and see what my success is. 

My hardware is a Macbook Pro (OS X 10.8.2).


Jeremiah-


Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.