Waraxe IT Security Portal  
  Login or Register
::  Home  ::  Search  ::  Your Account  ::  Forums  ::   Waraxe Advisories  ::  Tools  ::
March 29, 2024
Menu
 Home
 Logout
 Discussions
 Forums
 Members List
 IRC chat
 Tools
 Base64 coder
 MD5 hash
 CRC32 checksum
 ROT13 coder
 SHA-1 hash
 URL-decoder
 Sql Char Encoder
 Affiliates
 y3dips ITsec
 Md5 Cracker
 User Manuals
 AlbumNow
 Content
 Content
 Sections
 FAQ
 Top
 Info
 Feedback
 Recommend Us
 Search
 Journal
 Your Account



User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9145

People Online:
Visitors: 870
Members: 0
Total: 870
PacketStorm News
·301 Moved Permanently

read more...
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index -> All other hashes -> NTLM help
Post new topic  Reply to topic View previous topic :: View next topic 
NTLM help
PostPosted: Tue Dec 04, 2007 9:30 pm Reply with quote
Theino
Beginner
Beginner
 
Joined: Dec 04, 2007
Posts: 2




How would I go about cracking an NTLM hash. Would I use rainbow tables, could I find one or could someone help crack this for me? What are some brute forcing options?

Trying to crack:

4C92893B6C263AD01493B0DEC7162BCD
View user's profile Send private message
PostPosted: Thu Dec 06, 2007 9:04 am Reply with quote
redx
Beginner
Beginner
 
Joined: Oct 31, 2007
Posts: 2




Plaintext of 4C92893B6C263AD01493B0DEC7162BCD is palangga

I used the ntlm loweralpha 1-9 rainbowtables from http://www.freerainbowtables.com In many cases bruteforcing a hash is not a good option because depending on how long the password is it can take years. Cain http://www.oxid.it/cain.html is a good hash cracker. It will dump the password hashes right from the local system. It also supports many different hash types and has other features such as a network sniffer and ARP poisoning. There are lots of tutorials or just look it up on Google.
View user's profile Send private message
PostPosted: Tue Dec 11, 2007 8:46 pm Reply with quote
J33pG33k
Beginner
Beginner
 
Joined: Dec 11, 2007
Posts: 1




Ok. I just started doing a lot of reading this past Saturday, after I drunkenly changed a friends password on his Vista Ultimate laptop last Friday night. It was meant as a prank on somebody that I know as the ultimate prankster. He should have had a password on there in the first place...it was completely unprotected. I have to say that I am now very enlightened and amazed at how simple it can be to break passwords (especially on XP).

Anyway, I've signed up on www.freerainbowtables.com and have begun running the client. I've also submitted the hashes that I found (just like everyone else I was let down the Ophcrack Live CD told me that I needed the NTLM hashes). I want to download the ntlm rainbow tables that are offered on the site, but the torrents aren't working.

Can someone help me break these?

B58F4B91788698FF908DD2496A2F190F
4506B8F1519B156D2568E47735B4A446

Thanks!

BTW - I am on Kubuntu 7.10 x86_64 - so no Cain. I rid myself of MS products a couple years ago, and I've locked myself out of one of the few Windows machines I could have access to.

Edit - I've found the torrent that was mentioned in the 2nd post...I was looking in the wrong place before. Obviously it is going to be a while until I finish the download, so if somebody that has the ntlm tables could try these hashes, it would be much appreciated!
View user's profile Send private message
NTLM help
  www.waraxe.us Forum Index -> All other hashes
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
All times are GMT  
Page 1 of 1  

  
  
 Post new topic  Reply to topic  




Powered by phpBB © 2001-2008 phpBB Group






Space Raider game for Android, free download - Space Raider gameplay video - Zone Raider mobile games
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2020 Janek Vind "waraxe"
Page Generation: 0.162 Seconds