Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Sun, 12 Apr 2009 21:45:32 +0400
From: SmarTeam Support <smarteam.support@...il.com>
To: Solar Designer <john-users@...ts.openwall.com>
Subject: Re[2]: Windows user/pass

Tuesday, April 7, 2009, 9:57:19 PM, Solar wrote:


> On Mon, Apr 06, 2009 at 06:42:08PM +0200, Szarka G?bor wrote:
>> Rendszergazda:500:8C,29,EF,93,BE,C6,DE,61,38,36,5F,40,C1,41,A0,90,7A:
>> _D4,4F,DF,C5,F3,E2,0D,71,44,5C,56,E1,96,86,2A,60,XX:::

> This is a format used by Login Recovery's boot disks, "VERSION:04".

>> In this example Rendszergazda is the username. Is John capable of 
>> cracking this password?

> Yes, but you need to decode the hashes into the familiar PWDUMP format
> first.  Please use the attached Perl script for that.

on a system without Perl a person can use a program called LRConvert from
InsidePro's SamInside package - http://www.insidepro.com/download/saminside.zip

-- 
Best regards,
 SmarTeam                            mailto:smarteam.support@...il.com


-- 
To unsubscribe, e-mail john-users-unsubscribe@...ts.openwall.com and reply
to the automated confirmation request that will be sent to you.

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.