Date: Tue, 12 May 2009 12:52:25 -0300 From: nahuel.grisolia@...il.com To: john-users@...ts.openwall.com, jmk@...fus.net Subject: Re: Cracking Metasploit SMB stuff... 2009/5/12 jmk <jmk@...fus.net> > What you have there should be a LMv2 and a NTLMv2 challenge/response. > The John "NETLMv2" format can perform a brute-force crack against the > LMv2 set. The first 16 bytes of your "LMHASH" value should be the client > response and the next 8 are its challenge. You will also need the server > challenge issued by Metasploit, which I'm assuming was 1122334455667788. > The format of the file should then be as follows: > > USERNAME::DOMAIN:SERVER CHALLENGE:LMv2 RESPONSE:CLIENT CHALLENGE > > Using your data, you have: > > > user::DOMAIN:1122334455667788:8885a28be8a72ca650bd65069ca4a3f4:a5de1c918778d28f Thanx a lot Joe! It works really good! ...
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.