Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Mon, 13 Jan 2014 16:14:49 -0800
From: NRO <>
To: "" <>
Subject: Re: Cracking MSChap v2

I hope I'm not dumbing down the thread too much but: I got JTR Bleeding Jumbo installed and running and was able to enter the hash noted earlier in this thread. So far it's been running for 19 hours. So far no results and I'm not sure how to verify whether or not there is progress.

Have hit enter to get status but it just shoes 0 guesses.

> On Jan 13, 2014, at 3:48 PM, Pedro Worcel <> wrote:
> Thanks for this, I enjoyed the read.
> 2014/1/14 Rich Rumble <>
>>> On Mon, Jan 13, 2014 at 5:54 PM, Rob Fuller <> wrote:
>>> Looked through the source and mailing list, but couldn't find it, has
>> there
>>> been any work on cracking NetNTLMv1 down to NTLM hashes?
>> That blog post was grandstanding pure an simple, ntlmv1 has been
>> broken well before that blog post, by plenty of others.Every cracker
>> I've ever used broke the challange and the password, l0pht was first,
>> cain is still good. I just re-read the post (I even have an old
>> comment on it when it came out), I don't see what the fuss was about
>> with that blog post, other than it got some attention, when reading it
>> all I can think about is:
>> I believe there are patches for NetNTLMv1 in the Jumbo versions of JtR
>> -rich
> -- 
> GPG: <>

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.