Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Sat, 26 Jan 2013 20:23:49 +0100
From: madfran@...-ezine.org
To: john-users@...ts.openwall.com
Subject: Hash from a Windows 7

Hi,

Scenario.
Hash fron a workstation Windows 7 Professional 64 bit
The hash has been downloaded with pwdump7
Information downloaded,
sys_build_local:1000:8175E8A5154A540C5DF3EF8A549185D3:6750FFA0E043035F3CF37B976CF1624B:::
I know the password.
It follow the rules gave by the administrator, but I choose one not  
complicate.
the pass is: Victor-0000

As I know, the first hash is the LM one.

My system.
john-1.7.9-jumbo-6
Compiled over CYGWIN
Running in a Windows 7

What I did.
Copy in hash.txt the information downloaded by pwdump7
Launch ../john hash.txt
Result,...
$ ./john hash-2013-01-19.txt
Warning: detected hash type "lm", but the string is also recognized as "nt"
Use the "--format=nt" option to force loading these as that type instead
Warning: detected hash type "lm", but the string is also recognized as "nt2"
Use the "--format=nt2" option to force loading these as that type instead
Loaded 2 password hashes with no different salts (LM DES [128/128 BS SSE2])
guesses: 0  time: 0:00:00:07 0.00% (3)  c/s: 48937K  trying: 460LD0G - 460LUE-
,... and after 3 days,...stopped without no result

Then a copied in the file password.lst the extra information,
Victor-0000
VICTOR-0000
,...with the same result.

It is possible that john-jumbo has a bug, and is not able to crack the  
hash from Windows 7?

Regards,

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.