MacOS – Cracking hashes for MacOS passwords

macospassword

I've followed practically all the tutorials on cracking hashes for a macOS password, but I've come up empty handed.

I've ultimately come up with this hash:

Admin:$ml$28169$d144a9af9619163e3a77170cb41e3f6e554b22f9683f3c3c8a05676a87b41056$8c6f600a6f3d73a3edd45e6010669da4ed68ba1291489b31dd744af96b12f39d07abe5fbeac0db3cf377e2531d66a2d6d4eb1e281be21b10dea21b6cf13c432c1cb7299c827b891d72c98f5df375b0947f6eb5b2b42e33b1a16212671b71f2671dbd108314335674cad1dee8f281b6221600920abba7a2512bf3493b4cebfd69

I have tried both hashcat -m 7100 and john the ripper, but still nothing.

Any help would be immensely appreciated. I am trying to crack a Yosemite password.

Best Answer

You may find that just like with most unix like systems OS X uses a salt and a hash.

I would review some of the answers on AskDifferent such as:

What type of hash are a Mac's password stored in?

Your password and the salt is grilled by sha512 many times, then the result is base64'ed and reverse xxd'ed. Together with the salt and the iterations it's xxd'ed and base64'ed again.