Hi, I'm new to this and trying to crack the password on my old laptop running MacOS El Capitan
I've followed guides and believe I have the hash which I extracted from the username.plist, but I can't figure out how to get Hashcat to decrypt it
Can anyone help?
The code I'm trying to feed into Hashcat is:
$ml$27855$0f00d525e3c304eb2f7364b649e644c5b52d7ec9436c05e98bc71662601da9c9$43da1a97b943dd7cca9a5702d11e3a8befc0e3803428a9d05f7d01aff774c91e6f7d97fdb67dd2191554a00dcd03b2c1fd7898ddcf77f33714f058a7bd1c4cc15523dd707cb76c9ba37c57399f1721dfe5d209c5128b9549a46ae804f1cbcf929a429664fe6e8e1c931eb59899b3038ae722d9d4ea66b6da2f550b6bc5ba5558
The main hash I extracted is 256 characters and the salt is 64 Characters.
I've downloaded plist2hashcat incase I made a mistake extracting the info from the username.plist, but have no idea how to use it and can't find any instructions. Do I need to compile it into an app somehow?
Also wondering how rules work, as I know the password is probably less than 8 lowercase letters and definitely ends with 321
Thanks!
I've followed guides and believe I have the hash which I extracted from the username.plist, but I can't figure out how to get Hashcat to decrypt it
Can anyone help?
The code I'm trying to feed into Hashcat is:
$ml$27855$0f00d525e3c304eb2f7364b649e644c5b52d7ec9436c05e98bc71662601da9c9$43da1a97b943dd7cca9a5702d11e3a8befc0e3803428a9d05f7d01aff774c91e6f7d97fdb67dd2191554a00dcd03b2c1fd7898ddcf77f33714f058a7bd1c4cc15523dd707cb76c9ba37c57399f1721dfe5d209c5128b9549a46ae804f1cbcf929a429664fe6e8e1c931eb59899b3038ae722d9d4ea66b6da2f550b6bc5ba5558
The main hash I extracted is 256 characters and the salt is 64 Characters.
I've downloaded plist2hashcat incase I made a mistake extracting the info from the username.plist, but have no idea how to use it and can't find any instructions. Do I need to compile it into an app somehow?
Also wondering how rules work, as I know the password is probably less than 8 lowercase letters and definitely ends with 321
Thanks!