OSX 10.11 Hash HELP!
I have been trying to crack the hash of my OSX 10.11 mac using the established .plist extraction method, but even using all the correct options (as far as I know,) I get Token length exception no matter what I do! Specifically, I get this:
PS C:\Cracking\HashCat\hashcat-4.2.1> .\hashcat64.exe -m 7100 -a 0 C:\Cracking\Hashes\MyHash.txt C:\Cracking\Wordlists\rockyou.txt
hashcat (v4.2.1) starting...

* Device #1: WARNING! Kernel exec timeout is not disabled.
            This may cause "CL_OUT_OF_RESOURCES" or related errors.
            To disable the timeout, see: https://hashcat.net/q/timeoutpatch
nvmlDeviceGetFanSpeed(): Not Supported

OpenCL Platform #1: NVIDIA Corporation
* Device #1: GeForce GTX 980, 2048/8192 MB allocatable, 16MCU

Hashfile 'C:\Cracking\Hashes\MyHash.txt' on line 1 ($ml$38...efc9a7d183523cac2bdb2e84ed75a6e6): Token length exception
No hashes loaded.

Started: Thu Sep 06 20:17:34 2018
Stopped: Thu Sep 06 20:17:34 2018
PS C:\Cracking\HashCat\hashcat-4.2.1>

I have extracted the salt, hash, and iterations from my mac's plist, and orginized them in the format
and I have confirmed that my hash is extracted correctly, at least in that the iteration is a 5-digit number, the salt is a 64 character string in hex, and the entropy is a 256 character string also in hex. I have been using -m 7100, and it seems as if others cracking the same password type have had success with this, but I always recive Token length exception. The example hash for the 7100 option is a 128 character hex, but as I said, I have seen others using the 256 char hash. Do I have the wrong hash type? Or have I somehow extracted it wrong?

My hash (with a couple bits changed, but the same length) is this:

Look at https://hashcat.net/wiki/doku.php?id=example_hashes

You'll see that your entropy is too long. You only need 64 bytes there (and not 128)
Cut it off, and it will work.
(09-07-2018, 02:58 PM)Karamba Wrote: You only need 64 bytes there (and not 128)

Do you mean 128 and not 256, or am I missing something?

Thanks so much!
Also, do you have any why there is unneeded data at the end of the entropy that can just be cut off?
A byte is represented by two hexadecimal digits. So, when looking at your given entropy, the first byte is 0F.
As I mentioned higher, you need to take 64 bytes (= 128 hexadecimal digits) and not the full 128 bytes (= 256 hexadecimal digits).

As a bonus, take some time to look at the plist with a hexviewer. You'll see that entropy and salt begin with a sort of 'header' (0x4F10) followed by their length (in hex, not in dec).
After the salt, you'll see the 'header' 0x11 followed by two bytes. Those two are the iterations (Big Endian).

As another bonus, use this script to avoid headache in the future.
Awesome! thank you so much!