[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Sun, 12 Apr 2009 21:45:32 +0400
From: SmarTeam Support <smarteam.support@...il.com>
To: Solar Designer <john-users@...ts.openwall.com>
Subject: Re[2]: Windows user/pass
Tuesday, April 7, 2009, 9:57:19 PM, Solar wrote:
> On Mon, Apr 06, 2009 at 06:42:08PM +0200, Szarka G?bor wrote:
>> Rendszergazda:500:8C,29,EF,93,BE,C6,DE,61,38,36,5F,40,C1,41,A0,90,7A:
>> _D4,4F,DF,C5,F3,E2,0D,71,44,5C,56,E1,96,86,2A,60,XX:::
> This is a format used by Login Recovery's boot disks, "VERSION:04".
>> In this example Rendszergazda is the username. Is John capable of
>> cracking this password?
> Yes, but you need to decode the hashes into the familiar PWDUMP format
> first. Please use the attached Perl script for that.
on a system without Perl a person can use a program called LRConvert from
InsidePro's SamInside package - http://www.insidepro.com/download/saminside.zip
--
Best regards,
SmarTeam mailto:smarteam.support@...il.com
--
To unsubscribe, e-mail john-users-unsubscribe@...ts.openwall.com and reply
to the automated confirmation request that will be sent to you.
Powered by blists - more mailing lists
Powered by Openwall GNU/*/Linux -
Powered by OpenVZ