[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Wed, 19 Jul 2006 18:33:24 +0400
From: Solar Designer <solar@...nwall.com>
To: john-users@...ts.openwall.com
Subject: Re: Fwd: $100 plus several of my books if you can crack my Windows password hashes.
I forwarded a challenge in here, claiming that these are "NT hashes":
> >Easiest Challenge: 0570B4C2CC734E230DE9B67C868FAE04
> >Harder Challenge: 7B1FC86A9CD8955963E3930C42F4226F
> >Hardest Challenge: 4475BCB3B66320BF289D5475C7016A81
On Wed, Jul 19, 2006 at 10:18:41AM -0400, Douglas F. Calvert wrote:
> What is the appropriate way to put these strings into a file so that john
> will recognize the format?
One easy way would be to specify them as follows:
easiest10:$NT$0570B4C2CC734E230DE9B67C868FAE04
harder15:$NT$7B1FC86A9CD8955963E3930C42F4226F
hardest15+:$NT$4475BCB3B66320BF289D5475C7016A81
another would be to mimic PWDUMP output format, placing these into the
fourth field (where MD4-based NTLM hashes normally reside).
Of course, you would need a build of John with the contributed patch
applied to try cracking these.
P.S. I've unsubscribed "parminder singh" because of the off-topic
posting. I've also asked Realin - and am now asking the rest of list
members - to please refrain from commenting on off-topic postings.
Thanks,
--
Alexander Peslyak <solar at openwall.com>
GPG key ID: B35D3598 fp: 6429 0D7E F130 C13E C929 6447 73C3 A290 B35D 3598
http://www.openwall.com - bringing security into open computing environments
Was I helpful? Please give your feedback here: http://rate.affero.net/solar
--
To unsubscribe, e-mail john-users-unsubscribe@...ts.openwall.com and reply
to the automated confirmation request that will be sent to you.
Powered by blists - more mailing lists
Powered by Openwall GNU/*/Linux -
Powered by OpenVZ