Skip to content

Dump macOS 1.8+ password hashes to a hashcat-compatible format

License

Notifications You must be signed in to change notification settings

DominicBreuker/macdump

Repository files navigation

naabu

Dump macOS 1.8+ system user password hashes to a hashcat-compatible format. Can work either directly on the target system to dump password hashes of all users (root required) or offline on shadow hash data extracted from the system.

Installation

Use the package manager pip to install to a local machine:

pip install macdump

To get a standalone executable to be transferred to target systems, either download one from the release pages or build it with pyinstaller, as shown in the Makefile (make build-executable).

If Python is installed (it should be), you can also just copy the standalone version of the script. Find it in macdump.py

Usage

On target system

To run macdump directly on the target system, transfer either the standalone binary or the script macdump.py and run it as root. Obviously, this will only work on macOS. Output will be roughly as seen below.

Running the script (sudo python macdump.py) or the binary (sudo ./macdump):

 $ sudo python macdump.py
[+] Dumping hashes of all system users
[+] Dumping hash of testuser
[+] Authentication hint:  This is our default password
testuser:$ml$45871$f601fc65d033857cfc926ec2332058f791c1844f4e4fbb763568e063eafd742b$6eaf4c347e36648d471fe07fcf17b099d5f82ad050438d39dbad18a824b86d23165e69a881d699b0f3442658fe3ab77e9720e37386e6d05ef4f945b443f61b51427582447514b810e3be3dce5d70ea8ec215b2babeed0d92275ad662a04467134140a807c28178bb377503a50d4be1ba9d5944af88df04824a7075d1f9f116d5
[+] Put hashes into file 'hashes.txt', then crack with: hashcat -m 7100 --username hashes.txt -a 0 wordlist.txt

Offline

You can extract the shadow hash data on the target Mac, store it to a text file and use that as input for macdump. To get the data for user username, run:

sudo dscl . -read /Users/username dsAttrTypeNative:ShadowHashData > /tmp/shd.txt

Note: You may also just include all data by running sudo dscl . -read /Users/username > /tmp/shd.txt, which will output a lot of text. macdump finds what it needs.

Then get /tmp/shd.txt over to your machine and run:

 $ macdump --from-file /tmp/shd.txt
[+] Loading shadow hash data from /tmp/shd.txt
UNKNOWN_USER:$ml$45871$f601fc65d033857cfc926ec2332058f791c1844f4e4fbb763568e063eafd742b$6eaf4c347e36648d471fe07fcf17b099d5f82ad050438d39dbad18a824b86d23165e69a881d699b0f3442658fe3ab77e9720e37386e6d05ef4f945b443f61b51427582447514b810e3be3dce5d70ea8ec215b2babeed0d92275ad662a04467134140a807c28178bb377503a50d4be1ba9d5944af88df04824a7075d1f9f116d5
[+] Put hashes into file 'hashes.txt', then crack with: hashcat -m 7100 --username hashes.txt -a 0 wordlist.txt

Cracking

Hashes are printed in hashcat format including usernames. Store them inside a file hashes.txt, then run a command like the following:

 $ hashcat -m 7100 --username hashes.txt -a 0 wordlist.txt

hashcat (v6.2.5) starting

...

$ml$45871$f601fc65d033857cfc926ec2332058f791c1844f4e4fbb763568e063eafd742b$6eaf4c347e36648d471fe07fcf17b099d5f82ad050438d39dbad18a824b86d23165e69a881d699b0f3442658fe3ab77e9720e37
386e6d05ef4f945b443f61b51427582447514b810e3be3dce5d70ea8ec215b2babeed0d92275ad662a04467134140a807c28178bb377503a50d4be1ba9d5944af88df04824a7075d1f9f116d5:pass123

Session..........: hashcat
Status...........: Cracked
Hash.Mode........: 7100 (macOS v10.8+ (PBKDF2-SHA512))
...

Try this with the hash seen in the readme and a wordlist containing password pass123 to verify that your setup works.

Disclaimer

Macdump is for research and educational purposes only. Do not run this without consent on anybody's machine.

License

MIT

About

Dump macOS 1.8+ password hashes to a hashcat-compatible format

Topics

Resources

License

Stars

Watchers

Forks

Packages

No packages published