12-08-2021, 12:27 AM
(12-07-2021, 11:35 AM)Banaanhangwagen Wrote: For Mac OSX Snow Leopard, you'll find the hash to crack in the file /var/db/shadow/hash/GUID_of_your_user.
You should find a salted-SHA1, which you can crack with -m 122.
Sweet, thanks! I guess I was too distracted by what I saw in the file I referenced to consider looking elsewhere. Moth to a flame?
I now have it at least running without error. Now to actually try exercising hashcat to crack the password.