![]() bash: cd: /var/db/dslocal/nodes/Default/users: Permission denied I opened terminal on my mac and tried to acces to /var/db/dslocal/nodes/Default/users. After reading the article I knew that password hash in Mavericks is located in this path: /var/db/dslocal/nodes/Default/users/.plist. I am not so interested about that since I just like to test how weak my own password is. There is methods to obtain password hash(which is the password protected with mathematical algorithm) when you are unable to log into any account on the machine. It is step by step guide of what I was looking for, perfect! Not so many searches later I found this very decent article about “How to Extract OS X Mavericks Password Hash for Cracking With Hashcat”. Like in router article I did not have any previous experience about cracking OSx password. It is a Finnish word meaning lazy with little bit of leetspeak and it will pass Apples password policy. For this test I changed it to something which I feel is closer to password users normally have. I have actually learned something in past few months and I have very strong password at the moment. I am now going to crack my macbook pro which is running OSx Mavericks. Last time I tested how easy/hard it is to crack my wap2 secured wlan with weak password. ![]() When you read regular articles about security you will almost always face paragraph which tells you that it is very important to have a good password. I have been worried about security for a long time.
0 Comments
Leave a Reply. |