Select and Upload your .plist file:
- Uploaded files will be deleted immediately. We do NOT store your files.
- This site is using plist2hashcat to extract the hash. Supports plist files from MacOS 10.8+ (Mountain Lion and later)
- The goal of this page is to make it very easy to convert your Plist file to "hashes" which hashcat or John can crack.
- Plist file? Obtain the plist file located at /var/db/dslocal/nodes/Default/users/[user].plist
More than easy, just select and upload your .plist file. If valid, the file will be converted into a hash. The hash will be computed in the "Output" part. This hash can be sent on our website using algorithm "Mac OSX 10.8+ ($ml$)".
Version of Mac OSX 10.8+ use Plist file to store account credentials (PBKDF2-SHA512). Two tools can extract hashes from a Plist file : plist2hashcat.py and mac2john.py (former ml2john.py has been renamed to mac2john.py).
Output Hash format is: $ml$[iterations]$[salt]$[entropy]. Use mode 7100 with hashcat.
A MacOS X 10.8+ hash valid for Hashcat mode 7100 looks like:
Credits go to hashcat and John projects