Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Wed, 19 Jul 2006 18:33:24 +0400
From: Solar Designer <solar@...nwall.com>
To: john-users@...ts.openwall.com
Subject: Re: Fwd: $100 plus several of my books if you can crack my Windows password hashes.

I forwarded a challenge in here, claiming that these are "NT hashes":
> >Easiest Challenge: 0570B4C2CC734E230DE9B67C868FAE04
> >Harder Challenge: 7B1FC86A9CD8955963E3930C42F4226F
> >Hardest Challenge: 4475BCB3B66320BF289D5475C7016A81

On Wed, Jul 19, 2006 at 10:18:41AM -0400, Douglas F. Calvert wrote:
> What is the appropriate way to put these strings into a file so that john
> will recognize the format?

One easy way would be to specify them as follows:

easiest10:$NT$0570B4C2CC734E230DE9B67C868FAE04
harder15:$NT$7B1FC86A9CD8955963E3930C42F4226F
hardest15+:$NT$4475BCB3B66320BF289D5475C7016A81

another would be to mimic PWDUMP output format, placing these into the
fourth field (where MD4-based NTLM hashes normally reside).

Of course, you would need a build of John with the contributed patch
applied to try cracking these.

P.S. I've unsubscribed "parminder singh" because of the off-topic
posting.  I've also asked Realin - and am now asking the rest of list
members - to please refrain from commenting on off-topic postings.

Thanks,

-- 
Alexander Peslyak <solar at openwall.com>
GPG key ID: B35D3598  fp: 6429 0D7E F130 C13E C929  6447 73C3 A290 B35D 3598
http://www.openwall.com - bringing security into open computing environments

Was I helpful?  Please give your feedback here: http://rate.affero.net/solar

-- 
To unsubscribe, e-mail john-users-unsubscribe@...ts.openwall.com and reply
to the automated confirmation request that will be sent to you.

Powered by blists - more mailing lists

Your e-mail address:

Powered by Openwall GNU/*/Linux - Powered by OpenVZ