[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed, 27 Jun 2007 23:32:19 +0200
From: Dirk Wetter <dirk.wetter@...etter.org>
To: john-users@...ts.openwall.com
Subject: Re: Best Windows Password Cracking Method
Brian,
just use rainbow tables for this.
Cheers,
Dirk
Am 27.06.2007 23:05, Brian Smith schrieb:
> Hello all.
>
> I am working on cracking the LM hashes that I have dumped from several Windows servers as part of a penetration test and would like to see if I am using the best method. I have already cracked on 14 character password from this file and am assuming that the password that I'm working on is also 14 characters. Here is my progress so far:
>
> 1. Grabbed the local administrator hash from 3 separate servers using various exploits. The hash is identical in each instance, so the passwords are the same.
> 2. I have the large password list from Openwall and have already run this against the hashes, along with letting it brute force for 5 days at roughly 3,100K c/s.
> 3. I obtained the first part of the hash which contains letters, numbers, and a '.'.
> 4. Using this information, I have settled on the following approach to finish my cracking
> a. Using the incrementail crack mode 'alnum', I added the extra characters "!@... with the Extras = command in the john.conf
> b. I have increased the total number of characters to 40 and specified a min and max length of 7 in the john.conf for the alnum set
> c. I have repeated 'b' on another machine and specfiied a min and max of 6.
> 5. I have calculated that for the 7 length, it should take roughly 14 hours for the total set. Is this correct?
> 6. If this does not yield results, is there a good way to add extra characters to my already modified alnum set? Will John remember what it already tried and only try new combinations?
>
> Please let me know if you see any flaws in my approach or if anyone has any suggested improvements.
>
> Thanks
>
> Brian
>
--
Dirk Wetter @ Dr. Wetter IT Consulting http://drwetter.org
Beratung IT-Sicherheit + Open Source
Key fingerprint = 2AD6 BE0F 9863 C82D 21B3 64E5 C967 34D8 11B7 C62F
-
Found core file older than 7 days: /usr/share/man/man5/core.5.gz
--
To unsubscribe, e-mail john-users-unsubscribe@...ts.openwall.com and reply
to the automated confirmation request that will be sent to you.
Powered by blists - more mailing lists
Powered by Openwall GNU/*/Linux -
Powered by OpenVZ