Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri, 10 Sep 2010 08:20:07 +0200
From: "Magnum, P.I." <>
Subject: Re: Attacking Windows-ALT chars in LM Hashes

On 09/09/2010 10:02 PM, Solar Designer wrote:
>> 2) I could certainly modify dumbforce/or knownforce mode to target a
>> limited range of the most commonly used ALT + normal characters. I
>> guess my biggest question then is what numerical values do the ALT
>> characters correspond to? aka is ALT-0142 represented as a character
>> with value 142 in Windows, or is it encoded some other way?
> Apparently, these 8-bit character codes are passed into LM hashes as-is
> (assuming that those hashes are produced at all).

Well, they are first converted from [in this case] cp1252 to utf-16le.

JtR however, cheats when doing this conversion: it just puts a 0x00 
between each char. This works for most of the charset when converting 
from iso-8859-1 to utf-16le, but will fail on anything else. Thus, 
without rewriting JtR you will never ever crack a LM password containing 
a character whose utf-16le msb is not 0x00. There is no workaround.

In this case of ALT-0xxx keyboard codes, I guess this all means that if 
the character is the same position in iso-8859-1 as in cp1252, it will 
work, otherwise it will not.

This is a complex matter. I think I got it right, anyway this is the 
gist of it.


Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.