Software:DaveGrohl
Developer(s) | davegrohl.org |
---|---|
Stable release | 2.1
/ November 30, 2012 |
Operating system | Mac OS X |
Type | password cracking |
License | GNU GPL 2.0 |
Website | https://www.davegrohl.org/ |
DaveGrohl is a brute-force password cracker for macOS. It was originally created in 2010 as a password hash extractor but has since evolved into a standalone or distributed password cracker. DaveGrohl supports all of the standard Mac OS X user password hashes (MD4, SHA-512 and PBKDF2)[1][2][3] used since OS X Lion and also can extract them formatted for other popular password crackers like John the Ripper.[4] The latest stable release is designed specifically for Mac OS X Lion and Mountain Lion.
Attack Methods
DaveGrohl supports both dictionary and incremental attacks. A dictionary attack will scan through a number of pre-defined wordlists while an incremental attack will count through a character set until it finds the password. While in distributed mode, it uses Bonjour to find all the server nodes on the local network and therefore requires no configuration.
See also
References
- ↑ Dunstan, Patrick (2011-09-18). "Cracking OS X Lion Passwords". http://www.defenceindepth.net/2011/09/cracking-os-x-lion-passwords.html. Retrieved 2018-04-10.
- ↑ Lee, Graham (2012-07-05). "Password checking with CommonCrypto". http://www.sicpers.info/2012/07/password-checking-with-commoncrypto/. Retrieved 2018-04-10.
- ↑ Browning, Jeff (2012-10-24). "Crack OS X Mountain Lion Passwords". http://www.hackmac.org/tutorials/crack-os-x-mountain-lion-passwords/. Retrieved 2018-04-10.
- ↑ Peslyak, Alexander (2011-09-20). "Mac OS X 10.7 Lion password hashes (salted SHA-512)". http://www.openwall.com/lists/john-users/2011/09/20/3. Retrieved 2018-04-10.
External links
Original source: https://en.wikipedia.org/wiki/DaveGrohl.
Read more |