|
Message-ID: <CANO7a6woV18v4gxK2vO3xxtYEnYSuzseZQXhm7ubViUc5ResEA@mail.gmail.com> Date: Fri, 20 Jul 2012 08:31:56 +0530 From: Dhiru Kholia <dhiru.kholia@...il.com> To: john-users@...ts.openwall.com Subject: Re: john with Apple Keychains (/Users/Alex/Library/Keychains/login.keychain) On Thu, Jul 19, 2012 at 11:51 PM, Solar Designer <solar@...nwall.com> wrote: > Alex, Dhiru - > > On Thu, Jul 19, 2012 at 10:11:49PM +0400, Solar Designer wrote: >> On Thu, Jul 19, 2012 at 08:05:56PM +0200, Alex Kornilov wrote: >> > /Users/Alex/Desktop/magnumripper-magnum-jumbo-06444ba/run/john >> > --wordlist=/Users/Alex/Downloads/wordlist_john/Wordlists-20031009/all.lst >> > /Users/Alex/Library/Keychains/login.keychain-john >> > Loaded 1 password hash (Mac OS X Keychain PBKDF2-HMAC-SHA-1 3DES [32/64]) >> > Abort trap: 6 >> > >> > now error Abort trap: 6 (with most recent version) >> >> Yeah, I just ran into what looks like the same bug myself. It seems it >> is in magnum-jumbo only. Please try to downgrade to 1.7.9-jumbo-6 >> release. (And we'll fix the bug in magnum-jumbo indeed.) > > The crash I am observing on Linux is specific to single crack mode (and > thus is also seen in batch mode, which is the default when no options > are given). It is avoided with explicit "-w=password.lst -ru" or -i. This is the bug. uint8_t ipad[16]; for (i = 0; i < keylen; i++) ipad[i] = var1 ^ key[i]; The pbkdf kernel doesn't handle password lenghts > 16. I have committed a fix by limiting PLAINTEXT_LENGTH. Arch Linux didn't complain about stack smashing. Seems its gcc was built with that feature turned off :-( Alex, Do git pull and try again. Solar, I will integrate keychain2john into john soon. I was under assumption that I had done it until this mail came up. -- Cheers, Dhiru
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.