Full Disclosure mailing list archives

Re: Best way to crack NT passwds


From: "ad () class101 org" <ad () class101 org>
Date: Sat, 30 Jul 2005 10:15:07 +0200

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

prolly rainbow crack, often in less than 2min, it depends then of your tables size, around 25GB of tables to crack for example an alpanumericsymbol15 (with space) ntlm passwd.

At 10:15 30/07/05, X u r r o n wrote:
hiya!
I have tried many softwares for cracking NTLM hashes, like NC4, Cain and have't tried Rainbow Crack yet. Once i had to recover my XPs lost admin password and i spend around 1 day but Cain/NC4 were not able to guess that. Then i posted that hashes on some site and it did recover my passwd in around 5min. I want to know which technique they used to crack so fast ?

Xurron
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2rc2 (MingW32)

iQIVAwUBQus3Bq+LRXunxpxfAQITXw//XgCQkizJimpyJKEJPRMXsgSnS80xBOHs
kXwJ4DTSsdtNDqhrSvOmcI7Z52gOwCiXOsHCROf7Qmywf2JFoACWycIfJkOTib07
LqhQhqeStrtFdVsDlpjZq0WA8D6DQySIF/HPtE5JGmoEQlRmLwqzoHlEAo3Dqjt6
DQAEzgd4ZasfPI4bone60f+sYKhT5/dgabTucmEM120pUxlxqV6QpWWCihOCJLwf
8Pe037K8x8ST0NQT2CBTxb2EQNASyt8PmvalNeQbsPdthRSNjtbGbsw7hCfNV9b1
iGywDamZJ7e6S9YuJXvc41p7EdNNx15/CinfaeHCKJzY7/cXoE2Md7GlGHwq7XbG
WzPyVaxkdiU95g0x5gXMNhduWLDGu073ouPYC1r7sZ8REZhWtAaVolC6VFh3NzdS
2LSJLcoHU57jvEL25kYfuo7iP5lNx8yp/9DLV32xKGYHK6FBxdK1zEqb9CnfVh+2
4B511QKYMY755UQ1wvYQy6T4tksUdoUmUA471kBorpl1uvYW5YqQgkzsZ6n33nTH
3j1B3TgMkWaQuRhel/+Wp5xpbOG//6Bjd2s+b6B5K8R1mHrqEpcVIYnxxnHSICa7
Lga1oXu4GqgI2PLNaSBEz3X8dIOXQKFIfUCx5C/ZJGMAhvqIgfGyXytSEfzYx/a6
vBS7/sCgeL8=
=4lzc
-----END PGP SIGNATURE-----


_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Current thread: