lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Sat Jul 30 22:23:35 2005
From: ad at class101.org (ad@...ss101.org)
Subject: Best way to crack NT passwds

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Yup this application is probably the best for lm hashes , the main 
problem is then to generate a table as the alphanumsymbol15 one, 
basically it takes a lot of time , around 6months on only 1 comp 
1ghz, else you can still find some nice free services as 
http://milw0rm.com/md5 and some other similiar websites, but I guess 
their queue is full, nor the best solution is to look at the official 
rbcrack website, the founder is selling alphanumsymbol15 if I 
remember, nor on 20 computers 3Ghz you can expect 2weeks, 'shrink' 
purdue :>

At 15:32 30/07/05, Paul Farrow wrote:
>Yup after I posted that I read your post, have to admit, searching a 
>table full of hashes would be a hell of alot quicker than cracking 
>it manually :]
>But then again, I rarely crack any hashes (good memory for my own 
>passwords) but anything for md5 i use passcracking.net/com.
>But i suppose it wouldnt be difficult to code up a quick php page to 
>fill a mysql dbase with incremental hashes generated on the fly... 
>might look into it
>(even though its no doubt been done) fun project for a rainy day i 
>suppose.
>
>ad@...ss101.org wrote:
>
>>-----BEGIN PGP SIGNED MESSAGE-----
>>Hash: SHA1
>>
>>rainbow crack finds this pass "Test0r" in 5-10sec and you doesn't 
>>need an huge machine to get it, if you like johnthe ripper, I 
>>heavly suggest you to generate your tables and start using rbcrack, 
>>because you are loosing your time on john, believe me :)
>>
>>At 12:25 30/07/05, Paul Farrow wrote:
>>
>>>Chances are the system used by the website was a multi-processor 
>>>beast of machine, able to maximise cpu time to cracking the 
>>>passwords.
>>>If you can get the password hash, then your best bet is to run it 
>>>through jtr(john the ripper).
>>>
>>>C:\toolkit\passwords\pwdump> pwdump2
>>>Administrator:500:62b239ea3de3b4142e04d2d295f821b0:a929535485de3b50889
>>>23fd58d02cca2:::
>>>ASPNET:1000:f5052a93de1b6a7848d83fff52bb5c55:264d62a5f32f74bb6df2642a5
>>>14fd17f:::
>>>Guest:501:d9dce10ca0c8ba7baad3b435b51404ee:672e556cf53bf2a83c36bead638
>>>3212b:::
>>>__vmware_user__:1002:aad3b435b51404eeaad3b435b51404ee:69deddc712c272b3
>>>3e31fae0f4b82a73:::
>>>
>>>C:\toolkit\passwords\pwdump> pwdump2 > passwords.dump
>>>C:\toolkit\passwords\john>john -incremental passwords.dump
>>>Loaded 4 passwords with no different salts (NT LM DES [24/32 4K])
>>>TEST0R              (Administrator:2)
>>>guesses: 1  time: 0:00:00:20  c/s: 9045001  trying: PMSBRK - HLEYKL
>>>
>>>
>>>Thats on a 1.987mhz AMD processor in windows 2000, running about 
>>>30 other things at once.
>>>
>>>
>>>Hope this helps.
>>>
>>>X u r r o n wrote:
>>>
>>>>hiya!
>>>>I have tried many softwares for cracking NTLM hashes, like NC4, 
>>>>Cain and have't tried Rainbow Crack yet.
>>>>Once i had to recover my XPs lost admin password and i spend 
>>>>around 1 day but Cain/NC4 were not able to guess that. Then i 
>>>>posted that hashes on some site and it did recover my passwd in 
>>>>around 5min. I want to know which technique they used to crack so 
>>>>fast ?
>>>>
>>>>Xurron
>>>>
>>>>----------------------------------------------------------------------
>>>>--
>>>>
>>>>_______________________________________________
>>>>Full-Disclosure - We believe in it.
>>>>Charter: http://lists.grok.org.uk/full-disclosure-charter.html
>>>>Hosted and sponsored by Secunia - http://secunia.com/
>>>
>>>
>>>_______________________________________________
>>>Full-Disclosure - We believe in it.
>>>Charter: http://lists.grok.org.uk/full-disclosure-charter.html
>>>Hosted and sponsored by Secunia - http://secunia.com/
>>
>>-----BEGIN PGP SIGNATURE-----
>>Version: GnuPG v1.4.2rc2 (MingW32)
>>
>>iQIVAwUBQutb0a+LRXunxpxfAQK+3g//dof4pz4mFmqJOed4ehsBm+rrYDYsBqDq
>>1pwHhC9eHg72Ot/kij5DC7leEUNOH6BYi+UiDDOWWN3tvVnzHkHr3SmxGb6GBcyh
>>T9gmQcvkwq5beShtpCutXK51UCk70DmdKSbLnUGTFbofJHRb2j92zamjjSFnoyXr
>>r6mQ89mqxYy2dmxIUnbFFCWhUdr2sn0lVmwIX4cjjxQhOhKO5ouhxWy0FbHFuXt3
>>+OVNJ3LZWsbqmInEwSnTPw//YBbj4MVrE2RuxsqiAcZ7LJjuUoTX5ZIeZjw0/J7i
>>7YV1oLNeTqDBd9cCoshOXvHC9rLXaZ0ZX9oLfej7kxAGsQ1Yd6NXxHOJio4O0xeX
>>cLfItvV3TbESacg+O/MZc4VwOnrvHej9jADf49fteSjRs3uOx3aT9hSqVayJcyb1
>>zBINQbkIn3RiNOJj4/aKLm+uoJGioSGBRaw4BXvZSZ/1SixxmyDkJ0uo0a50dM7N
>>oxS6sgern8BljF20yhPEnPLQJPnD0NmgszpnAMUcbkydHiY3tseNBOeiSCB4Gft8
>>yHLAsHi1Om2tR25+dl+6mVnBlOHKa++lBius6wbymU3vbFSX0RXYuoz3p6npPpa2
>>irx0OcYT+OldV4YezKYIBPVa+/V5V7hOaGKGA3PpwLpVGSZwT9zqhVA2EimIhGeA
>>Ct6SEcxmUeY=
>>=+sl3
>>-----END PGP SIGNATURE-----
>>
>>
>
>_______________________________________________
>Full-Disclosure - We believe in it.
>Charter: http://lists.grok.org.uk/full-disclosure-charter.html
>Hosted and sponsored by Secunia - http://secunia.com/


****************************************************************
KEY: 0xA7C69C5F
PRINT: 694C 3495 BCC4 2F8B D794  6BD4 AF8B 457B A7C6 9C5F
****************************************************************

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2rc2 (MingW32)
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=Ap+n
-----END PGP SIGNATURE-----


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ