Date: Wed, 2 Sep 2009 17:35:22 -0600 From: Stephen John Smoogen <smooge@...il.com> To: john-users@...ts.openwall.com Subject: Re: Using Cain and Abel Hashes On Wed, Sep 2, 2009 at 4:01 PM, Kaleb Hosie<kalebh@...essdeniedinc.com> wrote: > Alright. For those that are not familiar with Cain and Abel, what it does is you can capture information traveling across the network. When a user logs on to Active Directory, it records the hash. The problem is that it isn't very efficient at cracking hashes (not to mention only for Windows). I've attached a hash as per Alexander's request. The password for this hash is: 2002 > > The confidential statement is set on the Exchange server and I don't have access. > > PS: This email is not confidential (unless you want it to be) :P > ________________________________________ Well I thought it might be a KRB5, but there must be something missing from how I set it up or other data XXX1:$krb5$DDobil$SPECTRA1.LOCAL$B0531432814115F216417AA118721FC83522175F1BDB357640862A77A613FCFC86BBF7BDE71BA26335B393E70EE3A76AF81DF098 -- Stephen J Smoogen. Ah, but a man's reach should exceed his grasp. Or what's a heaven for? -- Robert Browning
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.