Security Basics mailing list archives

RE: Password Cracking


From: Bénoni MARTIN <Benoni.MARTIN () libertis ga>
Date: Tue, 14 Sep 2004 09:26:15 +0100

Well, depends on how your passwords are encrypted ! LC5, Cain & Abel, ... worked for me, but just with passwords which 
were not encrypted with syskey. In this latter case, I don't know which tool can crack the passwords ...

 

-----Message d'origine-----
De : Simon Taplin [mailto:simont () pop co za] 
Envoyé : samedi 11 septembre 2004 13:56
À : Security-Basics
Objet : Re: Password Cracking

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

As a matter of interest, which is better for cracking Windows password files? LC4, LC5 or John? Do any one of these do 
a better job with say dictionary attacks versuses attacks on strong passwords?

Simon

Prasanna M wrote:

| just what are LC & John? (am new to security domain, sry) :-D Prasanna
|
| -----Original Message-----
| From: Simon Zuckerbraun
|
| Sent: 9/5/2004 8:34 AM
| Subject: RE: Password Cracking
|
| If I understand correctly, LC is capable of doing what you're asking.
|
| Simon
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (MingW32)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org

iD8DBQFBQvXx2tzE/ERi2VURAqoZAJ4wjO6A6OvnLacT7mUYKATNaMrXSACbBxUn
OJxAEwj1bwGRwfZwlvNoTC4=
=aMXT
-----END PGP SIGNATURE-----


---------------------------------------------------------------------------
Computer Forensics Training at the InfoSec Institute. All of our class sizes are guaranteed to be 12 students or less 
to facilitate one-on-one interaction with one of our expert instructors. Gain the in-demand skills of a certified 
computer examiner, learn to recover trace data left behind by fraud, theft, and cybercrime perpetrators. Discover the 
source of computer crime and abuse so that it never happens again.

http://www.infosecinstitute.com/courses/computer_forensics_training.html
----------------------------------------------------------------------------




---------------------------------------------------------------------------
Computer Forensics Training at the InfoSec Institute. All of our class sizes
are guaranteed to be 12 students or less to facilitate one-on-one
interaction with one of our expert instructors. Gain the in-demand skills of
a certified computer examiner, learn to recover trace data left behind by
fraud, theft, and cybercrime perpetrators. Discover the source of computer
crime and abuse so that it never happens again.

http://www.infosecinstitute.com/courses/computer_forensics_training.html
----------------------------------------------------------------------------


Current thread: