On Tue, Jul 17, 2012 at 11:48 PM, Alex Kornilov <[email protected]> wrote: > I try to "crack" my OS X login password. > $ john > --wordlist=/Users/Alex/Downloads/wordlist_john/Wordlists-20031009/all.lst > login.keychain.bak > $ john -show login.keychain.bak > 0 password hashes cracked, 1 left > > what I am doing wrong?
Hi Alex, Please bring this discussion to "john-users" mailing list where you will find john related answers. In short, For cracking OS X Keychains (which you seem to be doing) you need jumbo version of john. You can get it from https://github.com/magnumripper/magnum-jumbo. After doing "git clone", build john, run keychain2john program on login.keychain.bak file and then run john on the output of keychain2john. Another option is to obtain OS X hashes (using lion2john.pl program, included with john-jumbo) and crack those to figure out the login password. This option will be way faster than trying to crack the Keychain. -- Cheers, Dhiru _______________________________________________ Pauldotcom mailing list [email protected] http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom Main Web Site: http://pauldotcom.com
