Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CANO7a6zYujpxzD_LYvmGyCuydJrniv--ySiTQHS15wCT3G9QkA@mail.gmail.com>
Date: Wed, 18 Jul 2012 16:44:12 +0530
From: Dhiru Kholia <dhiru.kholia@...il.com>
To: pauldotcom@...l.pauldotcom.com
Cc: john-users@...ts.openwall.com
Subject: Re: [Pauldotcom] john with Apple Keychains (/Users/Alex/Library/Keychains/login.keychain)

On Tue, Jul 17, 2012 at 11:48 PM, Alex Kornilov <alex.kornilov3@...l.ru> wrote:
> I try to "crack" my OS X login password.
> $ john
> --wordlist=/Users/Alex/Downloads/wordlist_john/Wordlists-20031009/all.lst
> login.keychain.bak
> $ john -show login.keychain.bak
> 0 password hashes cracked, 1 left
>
> what I am doing wrong?

Hi Alex,

Please bring this discussion to "john-users" mailing list where you
will find john related answers.

In short,

For cracking OS X Keychains (which you seem to be doing) you need
jumbo version of john. You can get it from
https://github.com/magnumripper/magnum-jumbo. After doing "git clone",
build john, run keychain2john program on login.keychain.bak file and
then run john on the output of keychain2john.

Another option is to obtain OS X hashes (using lion2john.pl program,
included with john-jumbo) and crack those to figure out the login
password. This option will be way faster than trying to crack the
Keychain.

-- 
Cheers,
Dhiru

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.