|
|
Message-ID: <20110329162919736876.84baec95@gmail.com>
Date: Tue, 29 Mar 2011 16:29:19 +0200
From: "websiteaccess@...il.com" <websiteaccess@...il.com>
To: john-users@...ts.openwall.com
Subject: NTLM hash, is it cracked ?
Hi
With JTR 1.7.6, I try to crack this hash (NTLM)
Administrator:500:aad3b435b51404eeaad3b435b51404ee:72747c41396cbbec4203686b40a88670:::
I did and get :
iMac-de-xxx-xx:run xxxxx$ ./john -i:all ntlm.txt
Loaded 1 password hash (LM DES [128/128 BS SSE2])
Warning: MaxLen = 8 is too large for the current hash type, reduced to 7
Warning: mixed-case charset, but the current hash type is
case-insensitive;
some candidate passwords may be unnecessarily tried more than once.
(Administrator)
thread: 0 guesses: 1 time: 0:00:00:00 c/s: 8960 trying: SHELARD -
SPACY
- Is JTR detected it's a NTLM hash (I see : password hash (LM DES
[128/128 BS SSE2])) ?
?
- Is the plaintext is "empty" ?
W/A/
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.