Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Fri, 24 Feb 2017 21:34:17 +0100
From: Luis Rocha <>
Subject: Re: Cracking Kerberos tickets obtained using Kerberoasting technique

Nevermind about my last posts. its working with krb5tgs. The issue was just
the hash format.

$ ./john /tmp/Kerberos --fork=4 --format=krb5tgs --wordlist=/tmp/word
Using default input encoding: UTF-8
Loaded 1 password hash (krb5tgs, Kerberos 5 TGS etype 23 [MD4 HMAC-MD5 RC4])
Warning: OpenMP was disabled due to --fork; a non-OpenMP build may be faster
Node numbers 1-4 of 4 (fork)
Press 'q' or Ctrl-C to abort, almost any other key for status
Compl3xP4ssw0rd  ($krb5tgs$MSSQLSvc/
1 1g 0:00:00:00 DONE (2017-02-24 21:31) 7.142g/s 7.142p/s 7.142c/s 7.142C/s

Powered by blists - more mailing lists

Your e-mail address:

Powered by Openwall GNU/*/Linux - Powered by OpenVZ