|
|
|
|
Menu |
|
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
|
User Info |
|
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 100
Members: 0
Total: 100
|
|
|
|
|
|
Full disclosure |
|
|
|
|
|
|
|
|
|
IT Security and Insecurity Portal |
|
|
Damn |
|
Posted: Tue Feb 03, 2009 6:08 pm |
|
|
SSD |
Beginner |
|
|
Joined: Feb 03, 2009 |
Posts: 3 |
|
|
|
|
|
|
|
And bruteforcing takes time too much I think, this computer ain't any uber...one core, 512 ram etc. |
|
|
|
|
Posted: Tue Feb 03, 2009 8:44 pm |
|
|
waraxe |
Site admin |
|
|
Joined: May 11, 2004 |
Posts: 2407 |
Location: Estonia, Tartu |
|
|
|
|
|
|
No one can guarantee successful cracking of NT hash. If original password was very strong, then cracking is impossible at current state of technology. This is why there is cryptology - to make badguys life harder |
|
|
|
|
|
Re: Damn |
|
Posted: Wed Feb 04, 2009 1:09 am |
|
|
xxvvyy |
Regular user |
|
|
Joined: Feb 04, 2009 |
Posts: 20 |
|
|
|
|
|
|
|
SSD wrote: | And bruteforcing takes time too much I think, this computer ain't any uber...one core, 512 ram etc. |
Rome wasn't built in a day |
|
|
|
|
www.waraxe.us Forum Index -> Hash related information
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum
|
All times are GMT
Page 1 of 1
|
|
|
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|
|