Waraxe IT Security Portal  
  Login or Register
::  Home  ::  Search  ::  Your Account  ::  Forums  ::   Waraxe Advisories  ::  Tools  ::
April 19, 2014
Menu
 Home
 Logout
 Discussions
 Forums
 Members List
 IRC chat
 Tools
 Base64 coder
 MD5 hash
 CRC32 checksum
 ROT13 coder
 SHA-1 hash
 URL-decoder
 Sql Char Encoder
 Affiliates
 y3dips ITsec
 Md5 Cracker
 User Manuals
 AlbumNow
 Content
 Content
 Sections
 FAQ
 Top
 Info
 Feedback
 Recommend Us
 Search
 Journal
 Your Account



User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: Lokesh
New Today: 0
New Yesterday: 0
Overall: 8982

People Online:
Visitors: 239
Members: 0
Total: 239
milw0rm
·[web applications] - RunCMS 1.6.1 - (pm.class.php) Multiple SQL Injection Vulnerabilities
·[web applications] - csUpload Script Site - Authentication Bypass Vulnerability
·[web applications] - QuickCms 5.4 - Multiple Vulnerabilites
·[dos / poc] - Heartbleed User Session Extraction Exploit
·[dos / poc] - Asterisk 1.x - BYE Message Remote Denial of Service Vulnerability
·[remote exploits] - Vtiger Install Unauthenticated Remote Command Execution Exploit
·[remote exploits] - MS14-017 Microsoft Word RTF Object Confusion Exploit
·[remote exploits] - BlackBerry Z 10 Buffer Overflow Vulnerability
·[remote exploits] - Sun Java Runtime Environment 1.6 - WebStart JNLP File Stack Buffer Overflow
·[remote exploits] - GSC Client 1.00 2067 - Privilege Escalation Vulnerability

read more...
PacketStorm News
·FreeBSD Security Advisory - OpenSSL Issues
·FreeBSD Security Advisory - NFS Server Deadlock
·Cisco Security Advisory 20140409-asa
·Cisco Security Advisory 20140409-heartbleed
·Mandriva Linux Security Advisory 2014-067
·Slackware Security Advisory - openssl Updates
·Red Hat Security Advisory 2014-0380-01
·Red Hat Security Advisory 2014-0389-01
·Red Hat Security Advisory 2014-0383-01
·Red Hat Security Advisory 2014-0382-01

read more...
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index -> All other hashes -> LM and NTLM Hash decryption Goto page Previous  1, 2, 3, ... 76, 77, 78  Next
Post new topic  Reply to topic View previous topic :: View next topic 
Re: LM and NTLM Hash decryption
PostPosted: Tue Mar 03, 2009 7:09 pm Reply with quote
mrcool
Beginner
Beginner
 
Joined: Mar 03, 2009
Posts: 2




LM: C3FE1562055A6C1370A209B950ADCC78
NTLM :04A8A6B50D02E6B758A48850D38255F0
View user's profile Send private message Visit poster's website
Re: LM and NTLM Hash decryption
PostPosted: Tue Mar 03, 2009 7:55 pm Reply with quote
waraxe
Site admin
Site admin
 
Joined: May 11, 2004
Posts: 2407
Location: Estonia, Tartu




mrcool wrote:
LM: C3FE1562055A6C1370A209B950ADCC78
NTLM :04A8A6B50D02E6B758A48850D38255F0


Plaintext of C3FE1562055A6C1370A209B950ADCC78 is DS3WQ8M76H

Smile
View user's profile Send private message Send e-mail Visit poster's website
Re: LM and NTLM Hash decryption
PostPosted: Wed Mar 04, 2009 2:35 pm Reply with quote
mrcool
Beginner
Beginner
 
Joined: Mar 03, 2009
Posts: 2




A348708D7D3123097D4D901E4A60A715
BB51D711A53C21813C1CFBAABACB816E

Thanks in Advance
View user's profile Send private message Visit poster's website
PostPosted: Sat Mar 07, 2009 2:20 am Reply with quote
ukzz
Regular user
Regular user
 
Joined: Feb 05, 2009
Posts: 22




hi admin. Plz give me a macgic. I have some pass/salt

E7D62E7D1BCFA6924586BEAE08418B : OTOMESNDZN
A976D57668D46F94F8C156324D71FA : UORLQIWXML
/AA48DE77A8299221024592900155D8 : PQRDEDNRSM
View user's profile Send private message
Can you help me?
PostPosted: Sun Mar 08, 2009 12:51 pm Reply with quote
painatal69
Beginner
Beginner
 
Joined: Mar 08, 2009
Posts: 2




Thanks in advance. I need to know this hash.

LM Hash: 8ACB84B61464A0DFAAD3B435B51404EE

NT Hash: 3CF3E2CBEC78BFB41C341AE68822E989

I've tried to know them but I failed and I'm about to give up.

I appreciate very much your help.
View user's profile Send private message
PostPosted: Sun Mar 08, 2009 2:23 pm Reply with quote
waraxe
Site admin
Site admin
 
Joined: May 11, 2004
Posts: 2407
Location: Estonia, Tartu




Plaintext of 3CF3E2CBEC78BFB41C341AE68822E989 is Lac34l.

Smile
View user's profile Send private message Send e-mail Visit poster's website
PostPosted: Sun Mar 08, 2009 6:28 pm Reply with quote
painatal69
Beginner
Beginner
 
Joined: Mar 08, 2009
Posts: 2




Thank You.
You are GREAT. Laughing
View user's profile Send private message
PostPosted: Mon Mar 09, 2009 7:09 am Reply with quote
mic33
Regular user
Regular user
 
Joined: Mar 09, 2009
Posts: 11




Please Admin, i need help!
Thanks in advance. I need to know this hash:

LM: bf9696cfd07cc79c29231c00327c2124
NT: 5444950506e500673ad5210d13a6dff8

Thanks for help me!
View user's profile Send private message
PostPosted: Tue Mar 10, 2009 7:14 am Reply with quote
mic33
Regular user
Regular user
 
Joined: Mar 09, 2009
Posts: 11




mic33 wrote:
Please Admin, i need help!
Thanks in advance. I need to know this hash:

LM: bf9696cfd07cc79c29231c00327c2124
NT: 5444950506e500673ad5210d13a6dff8

Thanks for help me!


Can anyone help me please?...
Thanks for help!
View user's profile Send private message
PostPosted: Tue Mar 10, 2009 8:54 am Reply with quote
waraxe
Site admin
Site admin
 
Joined: May 11, 2004
Posts: 2407
Location: Estonia, Tartu




mic33 wrote:
mic33 wrote:
Please Admin, i need help!
Thanks in advance. I need to know this hash:

LM: bf9696cfd07cc79c29231c00327c2124
NT: 5444950506e500673ad5210d13a6dff8

Thanks for help me!


Can anyone help me please?...
Thanks for help!


I tried Rainbow Tables against LM hash and failed. So it seems, that password contains high-ascii characters (ord > 127).
Can you suggest the language for password? Does that language contain "weird" characters (like )? One thing to try is wordlists for specific language.
View user's profile Send private message Send e-mail Visit poster's website
PostPosted: Tue Mar 10, 2009 10:37 am Reply with quote
mic33
Regular user
Regular user
 
Joined: Mar 09, 2009
Posts: 11




Thanks for your help and your time!
language is Italian.... I think there aren't "weird" characters (like ), but there are special characters i.e: $, &, , etc
Can you help me please?
You are my last hope!!!!!
I appreciate very much!!!!
Thanks you!!!
View user's profile Send private message
PostPosted: Wed Mar 11, 2009 6:04 am Reply with quote
DEViANT
Beginner
Beginner
 
Joined: Mar 10, 2009
Posts: 2




I'm truly sorry, i know this is my first post, but I AM going to become active on this site, Ijust discovered it yesterday. Im working at an IT shop and we usually deal with hardware related issues so this is still pretty new to me.

Code:
NT Hash : BB27F42A518FC46E6AAC533943BF74EB
LM Hash : F0D412BD764FFE81AAD3B435B51404EE


I've been running a bruteforce throughout the night using LC5 AND SamInside with no avail...

-edit-

Also, the LM password seems to decrypt to : ADMIN

If thats of any help to anyone.
View user's profile Send private message Visit poster's website
PostPosted: Wed Mar 11, 2009 7:12 am Reply with quote
mic33
Regular user
Regular user
 
Joined: Mar 09, 2009
Posts: 11




Are there good news for me?
Is it possible to recovery my password?
excuce me.... and thanks very much!!!!!
View user's profile Send private message
PostPosted: Wed Mar 11, 2009 8:49 am Reply with quote
waraxe
Site admin
Site admin
 
Joined: May 11, 2004
Posts: 2407
Location: Estonia, Tartu




mic33 wrote:
Thanks for your help and your time!
language is Italian.... I think there aren't "weird" characters (like ), but there are special characters i.e: $, &, , etc
Can you help me please?
You are my last hope!!!!!
I appreciate very much!!!!
Thanks you!!!


I tried and with no luck ...
Only option seems to be LM bruteforce with extended charset, which includes ascii > 127.
View user's profile Send private message Send e-mail Visit poster's website
PostPosted: Wed Mar 11, 2009 8:51 am Reply with quote
waraxe
Site admin
Site admin
 
Joined: May 11, 2004
Posts: 2407
Location: Estonia, Tartu




DEViANT wrote:
I'm truly sorry, i know this is my first post, but I AM going to become active on this site, Ijust discovered it yesterday. Im working at an IT shop and we usually deal with hardware related issues so this is still pretty new to me.

Code:
NT Hash : BB27F42A518FC46E6AAC533943BF74EB
LM Hash : F0D412BD764FFE81AAD3B435B51404EE


I've been running a bruteforce throughout the night using LC5 AND SamInside with no avail...

-edit-

Also, the LM password seems to decrypt to : ADMIN

If thats of any help to anyone.


It's weird situation, because LM and NT hashes do not match!
LM hash resolves indeed to "ADMIN", but NT hash is something else.
View user's profile Send private message Send e-mail Visit poster's website
LM and NTLM Hash decryption
  www.waraxe.us Forum Index -> All other hashes
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
All times are GMT  
Page 2 of 78  
Goto page Previous  1, 2, 3, ... 76, 77, 78  Next
  
  
 Post new topic  Reply to topic  




Powered by phpBB 2001-2008 phpBB Group






Error messages
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2013 Janek Vind "waraxe"
Page Generation: 0.110 Seconds