|
Message-Id: <9ADA6BC0-63DF-4610-88BE-63EB47D3C142@gmail.com> Date: Mon, 23 Apr 2018 04:23:18 -0700 From: Eric Oyen <eric.oyen@...il.com> To: john-users@...ts.openwall.com Subject: Re: loading OS X hashes from Davegrohl ok, I downloaded the last historical version and did a test run with just the plain john command. it did not fail so, now I apply it to the task of cracking one of the files I created. -eric PGP fingerprint: 6DFB D6B0 3771 90F1 373E 570C 7EA2 1FF3 6B68 0386 On Apr 23, 2018, at 3:42 AM, Solar Designer wrote: > On Mon, Apr 23, 2018 at 03:25:40AM -0700, Eric Oyen wrote: >> ok, I had to do a little google search. A command turned up I can use called dscl. so I used dscl to dump both the salts and hashes for each user on my system. The command went like this: sudo dscl localhost read Search/Users/<username> >> <Username.txt> > > The "dscl" command is what that Perl script uses internally. I don't > know why the script would fail for you if the manual command works. > >> this dumped what appears to be proper data into those files. now all I need to do is run the jumbo supported john on them. > > Great. Right. > > Alexander
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.