|
Message-ID: <C3216A6C-7DC5-4E0C-8B3C-705A2382D15D@whitehatsec.com> Date: Wed, 30 Jan 2013 21:25:55 +0000 From: Jeremiah Grossman <jeremiah@...tehatsec.com> To: "john-dev@...ts.openwall.com" <john-dev@...ts.openwall.com> Subject: Re: dmg2john On Jan 30, 2013, at 1:02 PM, magnum <john.magnum@...hmail.com> wrote: > On 30 Jan, 2013, at 21:56 , Jeremiah Grossman <jeremiah@...tehatsec.com> wrote: > >> Thanks magnum, >> >> I pulled the latest code with git clone about an hour ago, substituted your dmg2john.c with the one that came down, and performed "make macosx-x86-64." All successful. >> >> Created two DMGs for testing. A 200MB AES-256 DMG and a 12GB AES-256 DMG, no data, and simple passphrase. Performed a dmg2john on both. Attached is the output in case someone wants to replicate. >> >> While I can't speak to the accuracy of the output, the results "look right" to me. Maybe someone is able to confirmed. Either way, the "all-zeros" issue seems to have been resolved. >> >> We might have a winner here. > > Are you saying your test files were successfully cracked? My files aren't. What kind of hardware is this? I strongly suspect my MBPr sets an iteration count other than the hardcoded one in the format. I will fix this. > > magnum I didn't crack them, just ran dmg2john, captured the output and stopped there. I can take the next step and see what my success is. My hardware is a Macbook Pro (OS X 10.8.2). Jeremiah-
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.