Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed, 2 Sep 2009 17:35:22 -0600
From: Stephen John Smoogen <>
Subject: Re: Using Cain and Abel Hashes

On Wed, Sep 2, 2009 at 4:01 PM, Kaleb Hosie<> wrote:
> Alright. For those that are not familiar with Cain and Abel, what it does is you can capture information traveling across the network. When a user logs on to Active Directory, it records the hash. The problem is that it isn't very efficient at cracking hashes (not to mention only for Windows). I've attached a hash as per Alexander's request. The password for this hash is: 2002
> The confidential statement is set on the Exchange server and I don't have access.
> PS: This email is not confidential (unless you want it to be) :P
> ________________________________________

Well I thought it might be a KRB5, but there must be something missing
from how I set it up or other data


Stephen J Smoogen.

Ah, but a man's reach should exceed his grasp. Or what's a heaven for?
-- Robert Browning

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.