Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email firstname.lastname@example.org
Re: [Full-disclosure] Best way to crack NT passwds
From: David Chastain (dlcmacosxmac.com)
Date: Mon Aug 01 2005 - 12:39:24 CDT
If you have physical access - Try BartPE
On Saturday, July 30, 2005, at 06:37AM, Paul Farrow <augm58dsl.pipex.com> wrote:
>Yup after I posted that I read your post, have to admit, searching a
>table full of hashes would be a hell of alot quicker than cracking it
>But then again, I rarely crack any hashes (good memory for my own
>passwords) but anything for md5 i use passcracking.net/com.
>But i suppose it wouldnt be difficult to code up a quick php page to
>fill a mysql dbase with incremental hashes generated on the fly... might
>look into it
>(even though its no doubt been done) fun project for a rainy day i suppose.
>> -----BEGIN PGP SIGNED MESSAGE-----
>> Hash: SHA1
>> rainbow crack finds this pass "Test0r" in 5-10sec and you doesn't need
>> an huge machine to get it, if you like johnthe ripper, I heavly
>> suggest you to generate your tables and start using rbcrack, because
>> you are loosing your time on john, believe me :)
>> At 12:25 30/07/05, Paul Farrow wrote:
>>> Chances are the system used by the website was a multi-processor
>>> beast of machine, able to maximise cpu time to cracking the passwords.
>>> If you can get the password hash, then your best bet is to run it
>>> through jtr(john the ripper).
>>> C:\toolkit\passwords\pwdump> pwdump2
>>> C:\toolkit\passwords\pwdump> pwdump2 > passwords.dump
>>> C:\toolkit\passwords\john>john -incremental passwords.dump
>>> Loaded 4 passwords with no different salts (NT LM DES [24/32 4K])
>>> TEST0R (Administrator:2)
>>> guesses: 1 time: 0:00:00:20 c/s: 9045001 trying: PMSBRK - HLEYKL
>>> Thats on a 1.987mhz AMD processor in windows 2000, running about 30
>>> other things at once.
>>> Hope this helps.
>>> X u r r o n wrote:
>>>> I have tried many softwares for cracking NTLM hashes, like NC4, Cain
>>>> and have't tried Rainbow Crack yet.
>>>> Once i had to recover my XPs lost admin password and i spend around
>>>> 1 day but Cain/NC4 were not able to guess that. Then i posted that
>>>> hashes on some site and it did recover my passwd in around 5min. I
>>>> want to know which technique they used to crack so fast ?
>>>> Full-Disclosure - We believe in it.
>>>> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
>>>> Hosted and sponsored by Secunia - http://secunia.com/
>>> Full-Disclosure - We believe in it.
>>> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
>>> Hosted and sponsored by Secunia - http://secunia.com/
>> -----BEGIN PGP SIGNATURE-----
>> Version: GnuPG v1.4.2rc2 (MingW32)
>> -----END PGP SIGNATURE-----
>Full-Disclosure - We believe in it.
>Hosted and sponsored by Secunia - http://secunia.com/
Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia - http://secunia.com/