Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu, 13 Sep 2012 15:20:45 +0800
From: Jonathan Xiao <bravowarrior5203@...il.com>
To: john-users@...ts.openwall.com
Subject: Re: Help for JTR

Hi Rich,

If it's based on the following hash input, can I safely say that the
password is of length 7 characters or below?

adm:1003:f5ed24301452410f0f802f643692aaef:3c4ac740fc1ecbee5da191a14f0cdc29:::

If the password is more than 7 characters then I will see this?
adm:1003:2.:f5ed24301452410f0f802f643692aaef:3c4ac740fc1ecbee5da191a14f0cdc29:::


Hi Frank,

The time taken for the first run (command:john.exe --format=LM hashes.txt)
is almost the same as the second run (command: john.exe --crack-status
--incremental hashes.txt).

Yup both runs did not yield any results as the guesses were both zero.

If the password is 14 characters long. how would the hash look like?
adm:1003:2.:f5ed24301452410f0f802f643692aaef:3c4ac740fc1ecbee5da191a14f0cdc29:::

I'm not sure if the system did not store LM hashes because if it did not
store, then when the SAM and system files are passed through cain & abel,
there are strings in both LM hash and NT hash. If it did not store, there
should only be strings in the NT hash field.

I will try to crack the password via NT format.

Thanks!

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.