Security Basics mailing list archives
RE: Password Cracking
From: Bénoni MARTIN <Benoni.MARTIN () libertis ga>
Date: Tue, 14 Sep 2004 09:26:15 +0100
Well, depends on how your passwords are encrypted ! LC5, Cain & Abel, ... worked for me, but just with passwords which were not encrypted with syskey. In this latter case, I don't know which tool can crack the passwords ... -----Message d'origine----- De : Simon Taplin [mailto:simont () pop co za] Envoyé : samedi 11 septembre 2004 13:56 À : Security-Basics Objet : Re: Password Cracking -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 As a matter of interest, which is better for cracking Windows password files? LC4, LC5 or John? Do any one of these do a better job with say dictionary attacks versuses attacks on strong passwords? Simon Prasanna M wrote: | just what are LC & John? (am new to security domain, sry) :-D Prasanna | | -----Original Message----- | From: Simon Zuckerbraun | | Sent: 9/5/2004 8:34 AM | Subject: RE: Password Cracking | | If I understand correctly, LC is capable of doing what you're asking. | | Simon -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.4 (MingW32) Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org iD8DBQFBQvXx2tzE/ERi2VURAqoZAJ4wjO6A6OvnLacT7mUYKATNaMrXSACbBxUn OJxAEwj1bwGRwfZwlvNoTC4= =aMXT -----END PGP SIGNATURE----- --------------------------------------------------------------------------- Computer Forensics Training at the InfoSec Institute. All of our class sizes are guaranteed to be 12 students or less to facilitate one-on-one interaction with one of our expert instructors. Gain the in-demand skills of a certified computer examiner, learn to recover trace data left behind by fraud, theft, and cybercrime perpetrators. Discover the source of computer crime and abuse so that it never happens again. http://www.infosecinstitute.com/courses/computer_forensics_training.html ---------------------------------------------------------------------------- --------------------------------------------------------------------------- Computer Forensics Training at the InfoSec Institute. All of our class sizes are guaranteed to be 12 students or less to facilitate one-on-one interaction with one of our expert instructors. Gain the in-demand skills of a certified computer examiner, learn to recover trace data left behind by fraud, theft, and cybercrime perpetrators. Discover the source of computer crime and abuse so that it never happens again. http://www.infosecinstitute.com/courses/computer_forensics_training.html ----------------------------------------------------------------------------
Current thread:
- Re: Password Cracking, (continued)
- Re: Password Cracking Steve (Sep 13)
- Re: Password Cracking Miles Stevenson (Sep 18)
- Re: Password Cracking Steve (Sep 13)
- RE: Password Cracking Andrew Shore (Sep 13)
- RE: Password Cracking Jonathan Loh (Sep 15)
- Re: Password Cracking Dave Aronson (Sep 18)
- RE: Password Cracking Nick Owen (Sep 15)
- RE: Password Cracking William Baglivio (Sep 15)
- RE: Password Cracking easternerd (Sep 23)
- Re: Password Cracking GuidoZ (Sep 15)
- Re: Password Cracking David J. Bianco (Sep 16)
- RE: Password Cracking Jonathan Loh (Sep 15)
- RE: Password Cracking Bénoni MARTIN (Sep 16)
- RE: Password Cracking James McGee (Sep 16)
- Re: Password Cracking Steve (Sep 17)
- RE: Password Cracking Kenton Smith (Sep 17)
- RE: Password Cracking Kenton Smith (Sep 19)
- RE: Password Cracking Dave Aronson (Sep 22)