[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Fri, 28 Oct 2005 21:48:54 +0400
From: Solar Designer <solar@...nwall.com>
To: john-users@...ts.openwall.com
Subject: Re: ntlm session response
On Fri, Oct 28, 2005 at 02:12:50PM -0800, Dylan Lim wrote:
> I am wondering whether it is possible for John to crack NTLM session response passwords where the authentication packets are captured over the network using network sniffers?
No, this is not currently supported, although it might be eventually.
--
Alexander Peslyak <solar at openwall.com>
GPG key ID: B35D3598 fp: 6429 0D7E F130 C13E C929 6447 73C3 A290 B35D 3598
http://www.openwall.com - bringing security into open computing environments
Powered by blists - more mailing lists
Powered by Openwall GNU/*/Linux -
Powered by OpenVZ