RE: Lotus Domino crack http hash tools

From: Miguel Dilaj (
Date: 08/04/05

  • Next message: Bernhard Mueller: "Re: All of the things you need to learn to be a pen-tester (Re: Pen t est basic needs)"
    To: <>, <>
    Date: Thu, 4 Aug 2005 09:07:18 +0100

    Hi all,

    Lepton's Crack (the main branch) also compiles on Cygwin on Windows, and we
    put some pre-compiled binaries for people not afraid of virus/trojans.
    Piero Brunati produced a slightly different branch
    ( that it's supposed to compile cleanly on
    Both versions support the old R4 Domino hash, the only difference is that
    Piero's support LM, whilst the main one has better support for REGEX and
    non-printable characters (one of these centuries I'm supposed to merge both
    versions, but don't expect that this morning ;-)


    -----Original Message-----
    From: Victor Chapela []
    Sent: 04 August 2005 00:23
    To: 'Mark Sec';;
    Subject: RE: Lotus Domino crack http hash tools

    Hi Mark,

    There are several different crackers for Lotus Domino, remember you have
    hashes and also id files. Some of the tools you can google for are:
            - Lodowep (java based for remote password checks)
            - Lepton's Crack or lcrack (for Linux)
            - Lotus Notes Key from or inkey.exe (for id
            - ID Password Recovery or ipr.exe (id files)
            - DominoHunter or (is a perl script)
            - and Domino Hash Breaker or dhb.exe (which you already have)

    This should give you a good start.


    This e-mail contains proprietary information, some or all of which may be legally privileged.
    It is for the intended recipient only. If an addressing or transmission error has misdirected this e-mail,
    please notify the author by replying to this e-mail. If you are not the intended recipient you may not use,
    disclose, distribute, copy, print or rely on this e-mail.

    FREE WHITE PAPER - Wireless LAN Security: What Hackers Know That You Don't

    Learn the hacker's secrets that compromise wireless LANs. Secure your
    WLAN by understanding these threats, available hacking tools and proven
    countermeasures. Defend your WLAN against man-in-the-Middle attacks and
    session hijacking, denial-of-service, rogue access points, identity
    thefts and MAC spoofing. Request your complimentary white paper at:

  • Next message: Bernhard Mueller: "Re: All of the things you need to learn to be a pen-tester (Re: Pen t est basic needs)"

    Relevant Pages

    • little by little, it motivates a doctrine too true worth her welcome film
      ... Diane, have a well-known crack. ... Somebody apparently guide as well as testy rear deserts. ... in support of the post-war photograph is the plaintiff that collapses ...
    • RE: ascx is ambiguous in the namespace ASP
      ... If I had duplicate files in the ... directory it would occur every time the site compiles. ... Microsoft MSDN Online Support Lead ... where an initial response from the community or a Microsoft Support ...
    • RE: Is there a way to generate a CodeCompileUnit from source code?
      ... It compiles. ... Microsoft Online Community Support ... You can send feedback directly to my manager at: ...
    • Re: RC4s initialization vector
      ... Hey Lakhdar will affect the frame, ... the crack will race within the worthwhile ... awake, through cheerful, in support of chemical rebels. ...
    • Re: Constant array
      ... Sane languages should provide this. ... it compiles it itself from your wordy expression (at least that would ... The way you're able to get it done, requires support for separate compilation ... to object code, which is a patchwork around the lack of proper module support: ...