|
Message-ID: <CANO7a6zYujpxzD_LYvmGyCuydJrniv--ySiTQHS15wCT3G9QkA@mail.gmail.com> Date: Wed, 18 Jul 2012 16:44:12 +0530 From: Dhiru Kholia <dhiru.kholia@...il.com> To: pauldotcom@...l.pauldotcom.com Cc: john-users@...ts.openwall.com Subject: Re: [Pauldotcom] john with Apple Keychains (/Users/Alex/Library/Keychains/login.keychain) On Tue, Jul 17, 2012 at 11:48 PM, Alex Kornilov <alex.kornilov3@...l.ru> wrote: > I try to "crack" my OS X login password. > $ john > --wordlist=/Users/Alex/Downloads/wordlist_john/Wordlists-20031009/all.lst > login.keychain.bak > $ john -show login.keychain.bak > 0 password hashes cracked, 1 left > > what I am doing wrong? Hi Alex, Please bring this discussion to "john-users" mailing list where you will find john related answers. In short, For cracking OS X Keychains (which you seem to be doing) you need jumbo version of john. You can get it from https://github.com/magnumripper/magnum-jumbo. After doing "git clone", build john, run keychain2john program on login.keychain.bak file and then run john on the output of keychain2john. Another option is to obtain OS X hashes (using lion2john.pl program, included with john-jumbo) and crack those to figure out the login password. This option will be way faster than trying to crack the Keychain. -- Cheers, Dhiru
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.