Date: Fri, 28 Oct 2005 21:48:54 +0400 From: Solar Designer <solar@...nwall.com> To: john-users@...ts.openwall.com Subject: Re: ntlm session response On Fri, Oct 28, 2005 at 02:12:50PM -0800, Dylan Lim wrote: > I am wondering whether it is possible for John to crack NTLM session response passwords where the authentication packets are captured over the network using network sniffers? No, this is not currently supported, although it might be eventually. -- Alexander Peslyak <solar at openwall.com> GPG key ID: B35D3598 fp: 6429 0D7E F130 C13E C929 6447 73C3 A290 B35D 3598 http://www.openwall.com - bringing security into open computing environments
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.