|
Message-ID: <20140112182124.GA12685@openwall.com> Date: Sun, 12 Jan 2014 22:21:24 +0400 From: Solar Designer <solar@...nwall.com> To: john-users@...ts.openwall.com Subject: Re: How to use Wordlists with John The Ripper On Sun, Jan 12, 2014 at 09:56:41AM -0800, C GPS wrote: > I extracted the hash by going into single user mode on my locked machine, > creating a root account and then running DaveGrohl to extract. The hash > that came out was very long. The short version that you see is my attempt > at disambiguating it per the instructions given in an instructional > tutorial on extracting hashes from 10.8. It is named sha1.txt only because > I named them that as again instructed by the aforementioned tutorial. > > Below is the complete hash without username: (I don't mind posting it > because the machine is not currently on-line). I'll be curious to know if > the clears anything up. Sure. bleeding-jumbo loads this hash just fine: Loaded 1 password hash (PBKDF2-HMAC-SHA512, GRUB2 / OS X 10.8+ [PBKDF2-SHA512 128/128 SSE4.1 2x]) You may get the bleeding-jumbo source code at: https://github.com/magnumripper/JohnTheRipper/tarball/bleeding-jumbo Alexander
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.