InfoSec Survival Guide: Cracking Cisco Passwords with John
http://infosecsurvivalguide.blogspot.com/2008/11/cracking-cisco-passwords-with-john.html
http://www.openwall.com/john/pro/macosx/
http://www.macshadows.com/forums/index.php?showtopic=8506
John the Ripper 1.7.3.1
http://mac.softpedia.com/get/Security/John-the-Ripper.shtml
John the Ripper 1.7.2 for G4 PowerPC, G5 PowerPC and Intel Macs (Universal Binary) (released 11/30/07)
http://www.macunix.net/JTR/john-1.7.2-macosx-universal.zip
Download the pre-patched (for OS X salted SHA1 hashes too) pre-compiled version of John the Ripper here:
http://www.macunix.net/JTR/
Unzip the archive.
Open Terminal.
Drag the file “john” from the folder “run” from within the unzipped “john-1.7.2-macosx-universal” folder to the Terminal window and let go.
Type a space.
Drag the text file containing your hash ( student:078D486A55E9922772C7F6F46113038E4800D6EDF4D31720 ) to the Terminal window and let go.
Click back in the Terminal window and press the return key.
QUOTE
Loaded 1 password hash (Salt SHA1 [salt-sha1])
barlow (student)