 |
|
 |
 |
Menu |
 |
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
 |
User Info |
 |
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 112
Members: 0
Total: 112
|
|
|
|
|
 |
Full disclosure |
 |
CyberDanube Security Research 20251014-0 | Multiple Vulnerabilities in Phoenix Contact QUINT4 UPS
apis.google.com - Insecure redirect via __lu parameter(exploited in the wild)
Urgent Security Vulnerabilities Discovered in Mercku Routers Model M6a
Re: Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
[SBA-ADV-20250730-01] CVE-2025-39664: Checkmk Path Traversal
[SBA-ADV-20250724-01] CVE-2025-32919: Checkmk Agent Privilege Escalation via Insecure Temporary Files
CVE-2025-59397 - Open Web Analytics SQL Injection
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Defense in depth -- the Microsoft way (part 93): SRP/SAFERwhitelisting goes black on Windows 11
Re: [FD]: "Glass Cage" – Zero-Click iMessage ? Persistent iOS Compromise + Bricking (CVE-2025-24085 / 24201, CNVD-2025-07885)
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Samtools v1.22.1 Uncontrolled Memory Allocation from Large BED Intervals Causes Denial-of-Service in Samtools/HTSlib
Samtools v1.22.1 Improper Handling of Excessive Histogram Bin Counts in Samtools Coverage Leads to Stack Overflow
|
|
|
|
|
|
 |
|
 |
 |
|
 |
IT Security and Insecurity Portal |
|
 |
Can Hashes differ? |
 |
Posted: Sat May 23, 2009 9:25 am |
|
|
andyha |
Beginner |

 |
|
Joined: May 19, 2009 |
Posts: 4 |
|
|
|
 |
 |
 |
|
Ok, so I'm new and not in complete control yet
I have a PC with an unkknown admin password.
I have extracted the sam and system files using BartPE and copied to another box on my network.
If I throw the sam file at SamInside I get different hashes to those that I get if I use Caine.
This challenges my understanding of how this works - I though the hashes were a direcr representation of the password - how can the same password (within the Sam file) result in different hashes?
Any thoughts of have I got it completely wrong
Thanks
A |
|
|
|
|
Posted: Sun May 24, 2009 3:22 am |
|
|
gibbocool |
Advanced user |

 |
|
Joined: Jan 22, 2008 |
Posts: 208 |
|
|
|
 |
 |
 |
|
A password will always hash the same if the algorithm is the same. So what you have here makes me think that you have two different hashing algorithms. However, when cracking hashes it is possible but extremely unlikely that you can find two different words that have the exact same hash. |
|
|
|
|
 |
 |
|
 |
Posted: Fri May 29, 2009 9:30 pm |
|
|
andyha |
Beginner |

 |
|
Joined: May 19, 2009 |
Posts: 4 |
|
|
|
 |
 |
 |
|
Thanks for taking the trouble to reply.
I would have though Caine and SamInside would use the same algorythm to get the hashes and would therefore return the same hashes
but the two program's dont.
Surely If I then try and use rainbow tables against the recovered hashes they are likely to return different passwords - apart from trying then how do I know if they are right - indeed how do I know which hashes are right.
Is there a more fool proof methof of extracting the hashes from the off target sam and system files?
Thanks again
Andrew |
|
|
|
|
www.waraxe.us Forum Index -> Newbies corner
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum
|
All times are GMT
Page 1 of 1
|
|
|
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|
|