Mavericks logon pas...
 
Notifications
Clear all

Mavericks logon password

5 Posts
2 Users
0 Reactions
503 Views
johnny
(@johnny)
Eminent Member
Joined: 21 years ago
Posts: 21
Topic starter  

Hoping for some help with this one.

I have a MacBook with a password protected user account, the OS is 10.9.1 - Mavericks and I'd like to be able to either reset the password or make an attempt to break it.

I am aware that the latter will not be easy as it is probably a salted SHA hash. What's more the method I have used in the past to locate the hash appears to have disappeared in this version of OSX.

I still have the user's .plist file in \private\var\db\dslocal\nodes\Default\users

but I can't find the corresponding file and .state file under \private\var\db\shadow\hash.

I've looked for any file with the UID string in its name but there are none, only a folder. This contains a number of .playlist files none of which appear to contain the hash.

Something has obviously changed, can anyone out there assist in either bypassing the logon password or identifying where the hash is now kept?

I've done some Googling on the subject but haven't turned up anything of use.

Many thanks

john


   
Quote
(@joel08)
Active Member
Joined: 15 years ago
Posts: 13
 

This may not be the best method but you can usually reset passwords for users.

http//coolestguidesontheplanet.com/reset-forgotten-admin-password-osx-10-8-mountain-lion/

I've used this a couple of times when people forget there admin passwords!

May want to look at the effects this has forensically thou. I believe if you document it, it will probably be okay.

Joel


   
ReplyQuote
johnny
(@johnny)
Eminent Member
Joined: 21 years ago
Posts: 21
Topic starter  

Thanks Joel!!

john


   
ReplyQuote
johnny
(@johnny)
Eminent Member
Joined: 21 years ago
Posts: 21
Topic starter  

I used Joel's suggestion to reset the password to something known. Having done so I've hashed the drive and did a before and after compare. Only 4 files changed including the user's plist file. This recorded the time and date of the password change as well as a few other differences in hex values.

Sadly, i'm not able to determine which is the before and after hash. cry


   
ReplyQuote
(@joel08)
Active Member
Joined: 15 years ago
Posts: 13
 

Thanks for posting your findings

Joel


   
ReplyQuote
Share: