Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Tue, 12 May 2009 12:52:25 -0300
From: nahuel.grisolia@...il.com
To: john-users@...ts.openwall.com, jmk@...fus.net
Subject: Re: Cracking Metasploit SMB stuff...

2009/5/12 jmk <jmk@...fus.net>

> What you have there should be a LMv2 and a NTLMv2 challenge/response.
> The John "NETLMv2" format can perform a brute-force crack against the
> LMv2 set. The first 16 bytes of your "LMHASH" value should be the client
> response and the next 8 are its challenge. You will also need the server
> challenge issued by Metasploit, which I'm assuming was 1122334455667788.
> The format of the file should then be as follows:
>
> USERNAME::DOMAIN:SERVER CHALLENGE:LMv2 RESPONSE:CLIENT CHALLENGE
>
> Using your data, you have:
>
>
> user::DOMAIN:1122334455667788:8885a28be8a72ca650bd65069ca4a3f4:a5de1c918778d28f

Thanx a lot Joe! It works really good! ...

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.