Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed, 6 Apr 2011 12:40:40 -0500
From: definitely crashing <slowlydryingup@...il.com>
To: john-users@...ts.openwall.com
Subject: Re: exhausted all lanman hashes -- error? -- newbie Q

Do any of the rainbow table sites have an API?  Wouldn't it be clever if
Johns first order of business was to check this resource?

On Wed, Apr 6, 2011 at 12:15 PM, Rich Rumble <richrumble@...il.com> wrote:

> On Wed, Apr 6, 2011 at 9:48 AM, Papa Tango <papatango.nyc@...il.com>
> wrote:
> > Most recently however, I attempted the same for a very old machine that
> had
> > been running windows 2000. I let John run for 22 days before it
> apparently
> > exhausted all possible passwords and ended itself. It found "(guest)" as
> a
> > password for a guest account...or perhaps I misinterpreted the on-screen
> > output and the guest account had no password at all. Other than that, it
> > found no other passwords. My pawdump file included an administrator
> password
> > hash that has a LANMAN hash.
> The guest account password defaults to none/blank/no-password which is the
> hash of: AAD3B435B51404EEAAD3B435B51404EE for LM and
> 31D6CFE0D16AE931B73C59D7E0C089C0 for NT.
> A password of "guest" would be
> A0E150C75A17008EAAD3B435B51404EE (lm)
> 823893ADFAD2CDA6E1A414F3EBDF58F7 (nt)
>
> John doesn't do an exhaustive bruteforce, but rather tries to be
> faster by picking
> more likely passwords once the incremental mode is being used.
> You can try more wordlists aka a bigger dictionary, better rules to
> try against the
> passwords, or even do an exhaustive BF against the password. Rainbow tables
> may prove to help you more, you can submit the hash to a number of free
> rainbow table sites that have precomputed 99.99% of all possible LM hashes
> and see if you get a return on them.
> I typically use the following commands when I begin a new attack against
> passwords:
> John.exe c:\hashes.txt –format=nt –session=nt-wordlist
> -w=dictionary.txt -rules=single
> John.exe c:\hashes.txt –format=nt –session=nt-wordlist
> -w=dictionary.txt -rules=wordlist
>
> This uses keyboard patterns (qwertyhgfdsa, qazwsxedc etc...)
> John.exe c:\hashes.txt –format=nt –session=nt-keyboard-hashes
> --external=keyboard
>
> This uses bruteforce (a, aa, ab, ac, ad...aaaa, aaab, aaac etc...)
> John.exe c:\hashes.txt –format=nt –session=nt-dumbforce-hashes
> --external=dumbforce
>
> The JtR website has links to various wordlist/dictionaries.
> -rich
>

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.