|
Message-ID: <51E4AFA5.9010105@comcast.net> Date: Mon, 15 Jul 2013 22:27:49 -0400 From: Barry Shaw <bshaw53@...cast.net> To: john-users@...ts.openwall.com Subject: Re: Using all.lst scan ends immediately with ?????? - ??? and no pwd found HI just wanted to follow up to say thanks, and ask one more question if I may. Dhiru your suggested worked great - I grabbed just the ml2john.py code from the bleeding-jumbo page and saved it in the new version of jtr that magnum pointed me too. When I ran it on my MAC it pulled the hash and the password (star789) immediately, as it is a simple one: XXs-MacBook-Pro:run root# sudo python ml2john.py /private/var/db/dslocal/nodes/Default/users/johnsmith.plist johnsmith:$pbkdf2-hmac-sha512$38759.c6c1a8fc5a91543ff73409577e5b3e37e9c996dac5fb26e3c2f1cd12802d69ea.f666f74c8198e7344367a4adec6ee62f1c6c2a0a78ffbaade769150dfef887935fb21ef0abcfcb137124d30ce310c9cdf1674a0074e687d7f0bc386619c4a279:502:20:John Smith,star789:/bin/bash:/private/var/db/dslocal/nodes/Default/users/johnsmith.plist XXs-MacBook-Pro:run root# Next I wanted to run the hash again in john to make sure I'm doing it right and get the same result. But where I'm stumbling is in creating the pwd file (sha1.txt) from the output hash. Specifically what portion of the complete output above needs to go into the password file? If I put everything in, or everything up to the final colon before the username (John Smith), running john produces the error 'No hash loaded'. If I create it with the main body of the hash, ie all 128 chara, john accepts the hash but when using --wordlist=all.lst, terminates with 'trying: ???_??? ' after a few seconds, which is where I was in the beginning. I'm sure it's my fault, which is why I came here to learn! thanks Baz On 7/12/2013 7:21 PM, Dhiru Kholia wrote: > On 07/12/13 at 06:43pm, bshaw53@...cast.net wrote: >> Used Dave Grohl (dave -j) to extract the hash on my Mac (OS X 8.4 >> Mountain Lion), pasted into plain text file and saved as SHA1.txt > JtR can do this hash extraction too. > > Use the latest JtR-jumbo code from, > https://github.com/magnumripper/JohnTheRipper/tree/bleeding-jumbo > > Running "ml2john.py /private/var/db/dslocal/nodes/Default/users/<username>.plist" > will give you the hash which will be recognized 100% by the latest JtR-jumbo code. > > -- > Dhiru >
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.