Vulnerability Development mailing list archives
Re: Password Cracking Challenge...
From: Justin Pryzby <justinpryzby () users sf net>
Date: Mon, 28 Jul 2003 12:44:45 -0700
Can't say for sure, but the zero's are interesting. I know the MS NTLM scheme takes passwords longer than 7(?) and breaks them up into two passwords, each of maximum length 7(?). That's the first thing I'd try. The encryption is documented, [http://www.innovation.ch/java/ntlm.html] is a good starting point. Justin On Mon, Jul 28, 2003 at 10:36:04PM +0000, Ronish Mehta wrote:
Below is a list of password (case sensitive) together with the encrypted password, is it possible to determine the algorithm used to hash the passwords with this sample?
Current thread:
- Password Cracking Challenge... Ronish Mehta (Jul 28)
- RE: Password Cracking Challenge... David Schwartz (Jul 28)
- <Possible follow-ups>
- Re: Password Cracking Challenge... Justin Pryzby (Jul 28)
- Re: Password Cracking Challenge... David Riley (Jul 28)
- RE: Password Cracking Challenge... Michael Wojcik (Jul 28)
- Re: Password Cracking Challenge... Vizzy (Jul 28)
- Re: Password Cracking Challenge... Ronish Mehta (Jul 31)
- RE: Password Cracking Challenge... Michael Wojcik (Jul 31)