Re: [Full-disclosure] Best way to crack NT passwds

ad_at_class101.org
Date: 07/30/05

  • Next message: lsi: "Re: [Full-disclosure] Cisco IOS Shellcode Presentation"
    Date: Sat, 30 Jul 2005 12:52:06 +0200
    To: pfarrow@flamenetworks.co.uk, full-disclosure@lists.grok.org.uk
    
    

    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1

    rainbow crack finds this pass "Test0r" in 5-10sec and you doesn't
    need an huge machine to get it, if you like johnthe ripper, I heavly
    suggest you to generate your tables and start using rbcrack, because
    you are loosing your time on john, believe me :)

    At 12:25 30/07/05, Paul Farrow wrote:
    >Chances are the system used by the website was a multi-processor
    >beast of machine, able to maximise cpu time to cracking the
    >passwords.
    >If you can get the password hash, then your best bet is to run it
    >through jtr(john the ripper).
    >
    >C:\toolkit\passwords\pwdump> pwdump2
    >Administrator:500:62b239ea3de3b4142e04d2d295f821b0:a929535485de3b50889
    >23fd58d02cca2:::
    >ASPNET:1000:f5052a93de1b6a7848d83fff52bb5c55:264d62a5f32f74bb6df2642a5
    >14fd17f:::
    >Guest:501:d9dce10ca0c8ba7baad3b435b51404ee:672e556cf53bf2a83c36bead638
    >3212b:::
    >__vmware_user__:1002:aad3b435b51404eeaad3b435b51404ee:69deddc712c272b3
    >3e31fae0f4b82a73:::
    >
    >C:\toolkit\passwords\pwdump> pwdump2 > passwords.dump
    >C:\toolkit\passwords\john>john -incremental passwords.dump
    >Loaded 4 passwords with no different salts (NT LM DES [24/32 4K])
    >TEST0R (Administrator:2)
    >guesses: 1 time: 0:00:00:20 c/s: 9045001 trying: PMSBRK - HLEYKL
    >
    >
    >Thats on a 1.987mhz AMD processor in windows 2000, running about 30
    >other things at once.
    >
    >
    >Hope this helps.
    >
    >X u r r o n wrote:
    >
    >>hiya!
    >>I have tried many softwares for cracking NTLM hashes, like NC4,
    >>Cain and have't tried Rainbow Crack yet.
    >>Once i had to recover my XPs lost admin password and i spend around
    >>1 day but Cain/NC4 were not able to guess that. Then i posted that
    >>hashes on some site and it did recover my passwd in around 5min. I
    >>want to know which technique they used to crack so fast ?
    >>
    >>Xurron
    >>
    >>----------------------------------------------------------------------
    >>--
    >>
    >>_______________________________________________
    >>Full-Disclosure - We believe in it.
    >>Charter: http://lists.grok.org.uk/full-disclosure-charter.html
    >>Hosted and sponsored by Secunia - http://secunia.com/
    >
    >_______________________________________________
    >Full-Disclosure - We believe in it.
    >Charter: http://lists.grok.org.uk/full-disclosure-charter.html
    >Hosted and sponsored by Secunia - http://secunia.com/
    -----BEGIN PGP SIGNATURE-----
    Version: GnuPG v1.4.2rc2 (MingW32)

    iQIVAwUBQutb0a+LRXunxpxfAQK+3g//dof4pz4mFmqJOed4ehsBm+rrYDYsBqDq
    1pwHhC9eHg72Ot/kij5DC7leEUNOH6BYi+UiDDOWWN3tvVnzHkHr3SmxGb6GBcyh
    T9gmQcvkwq5beShtpCutXK51UCk70DmdKSbLnUGTFbofJHRb2j92zamjjSFnoyXr
    r6mQ89mqxYy2dmxIUnbFFCWhUdr2sn0lVmwIX4cjjxQhOhKO5ouhxWy0FbHFuXt3
    +OVNJ3LZWsbqmInEwSnTPw//YBbj4MVrE2RuxsqiAcZ7LJjuUoTX5ZIeZjw0/J7i
    7YV1oLNeTqDBd9cCoshOXvHC9rLXaZ0ZX9oLfej7kxAGsQ1Yd6NXxHOJio4O0xeX
    cLfItvV3TbESacg+O/MZc4VwOnrvHej9jADf49fteSjRs3uOx3aT9hSqVayJcyb1
    zBINQbkIn3RiNOJj4/aKLm+uoJGioSGBRaw4BXvZSZ/1SixxmyDkJ0uo0a50dM7N
    oxS6sgern8BljF20yhPEnPLQJPnD0NmgszpnAMUcbkydHiY3tseNBOeiSCB4Gft8
    yHLAsHi1Om2tR25+dl+6mVnBlOHKa++lBius6wbymU3vbFSX0RXYuoz3p6npPpa2
    irx0OcYT+OldV4YezKYIBPVa+/V5V7hOaGKGA3PpwLpVGSZwT9zqhVA2EimIhGeA
    Ct6SEcxmUeY=
    =+sl3
    -----END PGP SIGNATURE-----

    _______________________________________________
    Full-Disclosure - We believe in it.
    Charter: http://lists.grok.org.uk/full-disclosure-charter.html
    Hosted and sponsored by Secunia - http://secunia.com/


  • Next message: lsi: "Re: [Full-disclosure] Cisco IOS Shellcode Presentation"

    Relevant Pages

    • [Full-disclosure] Best way to crack NT passwds
      ... I have tried many softwares for cracking NTLM hashes, like NC4, Cain and ... have't tried Rainbow Crack yet. ... Once i had to recover my XPs lost admin password and i spend around 1 day ...
      (Full-Disclosure)
    • Re: [Full-disclosure] Best way to crack NT passwds
      ... alpanumericsymbol15 ntlm passwd. ... >I have tried many softwares for cracking NTLM hashes, like NC4, Cain ... >and have't tried Rainbow Crack yet. ... >hashes on some site and it did recover my passwd in around 5min. ...
      (Full-Disclosure)