Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Wed, 19 Jul 2006 18:33:24 +0400
From: Solar Designer <>
Subject: Re: Fwd: $100 plus several of my books if you can crack my Windows password hashes.

I forwarded a challenge in here, claiming that these are "NT hashes":
> >Easiest Challenge: 0570B4C2CC734E230DE9B67C868FAE04
> >Harder Challenge: 7B1FC86A9CD8955963E3930C42F4226F
> >Hardest Challenge: 4475BCB3B66320BF289D5475C7016A81

On Wed, Jul 19, 2006 at 10:18:41AM -0400, Douglas F. Calvert wrote:
> What is the appropriate way to put these strings into a file so that john
> will recognize the format?

One easy way would be to specify them as follows:


another would be to mimic PWDUMP output format, placing these into the
fourth field (where MD4-based NTLM hashes normally reside).

Of course, you would need a build of John with the contributed patch
applied to try cracking these.

P.S. I've unsubscribed "parminder singh" because of the off-topic
posting.  I've also asked Realin - and am now asking the rest of list
members - to please refrain from commenting on off-topic postings.


Alexander Peslyak <solar at>
GPG key ID: B35D3598  fp: 6429 0D7E F130 C13E C929  6447 73C3 A290 B35D 3598 - bringing security into open computing environments

Was I helpful?  Please give your feedback here:

To unsubscribe, e-mail and reply
to the automated confirmation request that will be sent to you.

Powered by blists - more mailing lists

Your e-mail address:

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.