[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Fri, 11 Nov 2011 16:42:40 +0100
From: rootkit rootkit <rootkit77@...il.com>
To: john-users@...ts.openwall.com
Subject: NTLM challenge/response cracking (again...)
Hello list,
I have a few NTLM C/R proxy authentications sniffed with ettercap and
I'm trying to crack them. They look like the usual:
user:::LM:NTLM:CHALLENGE
The challenge changes every time as this is just a sniff.
Information on this topic are very difficult to find. At the beginning
I was thinking about generating rainbow tables for each different
CHALLENGE, but that would be really too much.
I then came across this very useful post from Alex
http://www.openwall.com/lists/john-users/2010/07/09/1
However there's something I don't understand: does the NETLM cracking
work only if the challenge is 1122334455667788? Would it work for any
challenge?
I'm asking this because I tried to crack my own account (of which I
know the password) using a dictionary with my password in it, and it
didn't work. And it did not work with brute force either.
Thanks.
Powered by blists - more mailing lists
Powered by Openwall GNU/*/Linux -
Powered by OpenVZ