|
|
|
|
Menu |
|
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
|
User Info |
|
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 91
Members: 0
Total: 91
|
|
|
|
|
|
Full disclosure |
|
|
|
|
|
|
|
|
|
IT Security and Insecurity Portal |
|
|
Vista NTLM hash (salted?) |
|
Posted: Sun May 03, 2009 10:59 pm |
|
|
BillyC |
Beginner |
|
|
Joined: Apr 29, 2009 |
Posts: 3 |
Location: U.S. |
|
|
|
|
|
|
Hello, I'm not sure if this is covered somewhere, but i managed to retrieve this NTLM Hash...
XXXXX:1002::39EEA0E44AA222E0F100AE4229AB9994:::
The name was removed for privacy reasons.
I've retrieved the hash with PwDump via Ophcrack LiveCD.
However, i've tried many things and they all failed...
1) Dictionary attack (L0phtcrack)
2) Hybrid attack (L0phtcrack)
3) 4-letter bruteforce (Ophcrack)
4) Free Vista RT (Ophcrack)
5) Cain & Abel
6) John the Ripper
7) Alphanumeric 7 digit bruteforce (LCP)
I SERIOUSLY need help here. Is the hash salted or something? I've tried so many things, but nothing is working! Please, if anyone knows how to do this, please help.
Thanks in advance!
39EEA0E44AA222E0F100AE4229AB9994 |
|
|
|
|
|
www.waraxe.us Forum Index -> All other hashes
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum
|
All times are GMT
Page 1 of 1
|
|
|
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|
|