Penetration Testing mailing list archives
Re: [PEN-TEST] NT Passwors Cracking
From: mvanaswegen () DELOITTE CO ZA
Date: Thu, 30 Nov 2000 07:54:22 +0200
Hi Claude Pwdump2 is great for extracting password hashed from "memory". You can find it on http://packetstorm.securify.com Just pipe it to a file and import it to your fav. password cracker. pwdump2 > luser_hashes.txt Marinus van Aswegen -----Original Message----- From: Beauregard, Claude Q [mailto:CQBeauregard () AAAMICHIGAN COM] Sent: 29 November 2000 07:13 To: PEN-TEST () securityfocus com Subject: [PEN-TEST] NT Passwors Cracking Question: I used to L0phtcrack to download the hashes from the registry of an NT server. The password hashes are Syskeyed so L0phtcrack isn't going to work (I believe I'm correct on this). I don't have direct access to the NT server the hashes were downloaded from. Is there a way to save the hashes to a file and run the file through another utility that will decrypt the hashes. Thanks C
Current thread:
- Re: [PEN-TEST] NT Passwors Cracking Ryan Russell (Dec 01)
- <Possible follow-ups>
- Re: [PEN-TEST] NT Passwors Cracking mvanaswegen (Dec 01)
- Re: [PEN-TEST] NT Passwors Cracking Conor Crowley (Dec 01)
- Re: [PEN-TEST] NT Passwors Cracking Beauregard, Claude Q (Dec 01)
- Re: [PEN-TEST] NT Passwors Cracking Beauregard, Claude Q (Dec 01)