RE: Cracking Ettercap Generated hashes



I think cain would work well for that. You could try dictionary or
brute force methods as well as a cryptanalysis using rainbow tables if
you have the right ones built.

-----Original Message-----
From: listbounce@xxxxxxxxxxxxxxxxx [mailto:listbounce@xxxxxxxxxxxxxxxxx]
On Behalf Of Danux
Sent: Friday, November 16, 2007 6:30 PM
To: pen-test@xxxxxxxxxxxxxxxxx
Subject: Cracking Ettercap Generated hashes

Hi Experts,

After testing a client network, i got a hash through Ettercap(ARP
Spoofing) , but when trying to cracking the hash with RainbowCrack it
seems not to be a NTLM format, and nothing happens.
Here i show the hash gathered:

SMB : 172.16.16.135:445 ->
USER: mjones
HASH:
mjones:"":"":1EA3083687301F2E00000000000000000000000000000000:2F8EDA1AD2
0B80974F86656996787855C5CF3417FD44BF03:BD9AE7964A5E989B
DOMAIN: IMS

Do you know how to crack hashes gathered from Ettercap(ARP Spoofing)?


--
Danux, CISSP
Chief Information Security Officer
Macula Security Consulting Group
www.macula-group.com

------------------------------------------------------------------------
This list is sponsored by: Cenzic

Need to secure your web apps NOW?
Cenzic finds more, "real" vulnerabilities fast.
Click to try it, buy it or download a solution FREE today!

http://www.cenzic.com/downloads
------------------------------------------------------------------------


**DISCLAIMER
This e-mail message and any files transmitted with it are intended for the use of the individual or entity to which they are addressed and may contain information that is privileged, proprietary and confidential. If you are not the intended recipient, you may not use, copy or disclose to anyone the message or any information contained in the message. If you have received this communication in error, please notify the sender and delete this e-mail message. The contents do not represent the opinion of D&E except to the extent that it relates to their official business.

------------------------------------------------------------------------
This list is sponsored by: Cenzic

Need to secure your web apps NOW?
Cenzic finds more, "real" vulnerabilities fast.
Click to try it, buy it or download a solution FREE today!

http://www.cenzic.com/downloads
------------------------------------------------------------------------



Relevant Pages

  • Re: Brute-forcing cached Windows login password hashes
    ... The hash algorithm is a salted MD4. ... it's mathematically infeasible) to use rainbow tables because of the ... My question is regarding the encrypted password hashes that Windows ... buy it or download a solution FREE today! ...
    (Pen-Test)
  • Re: get MD5-Hash from /etc/shadow file
    ... The only way to determine the password from the hash would be using a rainbow table to look up the hash and see what password produced it. ... Even then that might not be the password you used since there is some collision in md5. ... buy it or download a solution FREE today! ...
    (Pen-Test)
  • Re: Best way to encrypt password in database.
    ... session some kind of hash is used to validate the session. ... though are weak passwords and rainbow tables... ... If you password hashes ... MD5 is not broken. ...
    (comp.lang.php)
  • Re: Best way to encrypt password in database.
    ... Yep, that's the traditional way to do it, hash the password every logon ... though are weak passwords and rainbow tables... ... password encryption routine do a large number of rehashes/rounds (think ... and getting brokener. ...
    (comp.lang.php)
  • Re: Best way to encrypt password in database.
    ... Yep, that's the traditional way to do it, hash the password every logon ... though are weak passwords and rainbow tables... ... password encryption routine do a large number of rehashes/rounds (think ... a few hundred) to make brute force attacks painfully slow. ...
    (comp.lang.php)