|
|
|
|
Menu |
|
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
|
User Info |
|
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 98
Members: 0
Total: 98
|
|
|
|
|
|
Full disclosure |
|
|
|
|
|
|
|
|
|
IT Security and Insecurity Portal |
|
|
|
3b9baeef024879fe99e534584d29f818:]zz7;
46e10d8b74f8c19651c97f82f04f0466:GV@Qf
25ec037442e8de65da2bbe9fa9b36109:*A_KD
Reward is $10 via Paypal. Thanks.
Edit:
Added two more h ... |
|
|
|
|
b4c96a9fe01060a0b8bcfd1ffb68b161:U[mCX = ilovebmw
7f71b464977438729d6f55f222851daa:3nLy@ = microasoftotm22
P.S. Nice nick |
|
|
|
|
It would be
UserName:3:29738582FE12235E:020E3E793046F14E00000000000000000000000000000000:CCF3DD7F07AB31BBB2BB2A31D7331A52C55BE04ECF43191E |
|
|
|
|
It's not really NTLM v2. "NTLM2 Session Response" is an unofficial term. And it does utilize two challenges - LM response hash is in fact null-padded client challenge.
As for importing the data to ... |
|
|
|
|
Yes I used Cain to get this data, but i dont know why the lm hash has all those 0000... in it and if this is okey? and if the nt hash isnt too long.
Because these are not regular LM/NTLM hashes but ... |
|
|
|
|
I have 0 experience with linux systems
Then even if you had root access it would be of no use for you lol |
|
|
|
|
Guy is a scammer, beware. |
|
|
|
|
I received the money. Thanks. |
|
|
|
|
You can check it here: http://www.insidepro.com/hashes.php?lang=eng
I PM'd you with my paypal e-mail. |
|
|
|
|
Yeah, pay Henderson first before I release the second hash. I don't like scammers.
Yeah, scammer! |
|
|
|
|
It's r57shell (a php shell script) compressed and encoded by calling gzdeflate() and base64_encode() repeatedly. |
|
|
|
|
The phrase er6%04H%1B%95%7F%96%02%B7v%F2a%02%9E%FC consists of two parts:
e = same as first letter of e-mail
723604481B957F9602B776F261029EFC = ciphertext (hex)
We know the plaintext, so we XOR ... |
|
|
Page 1 of 4 |
Goto page 1, 2, 3, 4Next All times are GMT |
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|
|