|
|
|
|
Menu |
|
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
|
User Info |
|
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 126
Members: 0
Total: 126
|
|
|
|
|
|
Full disclosure |
|
|
|
|
|
|
|
|
|
IT Security and Insecurity Portal |
|
|
Cracking Windows 7 NTLM |
|
Posted: Thu Feb 09, 2012 4:05 am |
|
|
CelticWhisper |
Beginner |
|
|
Joined: Feb 09, 2012 |
Posts: 2 |
|
|
|
|
|
|
|
Hi all,
Trying to crack a W7 NTLM hash and am having a spot of trouble with it.
My methods:
-Pulled the HDD, connected to another PC via SATA->USB adapter.
-Used Cain to import from SAM & find boot key
-Cain shows password as being <8 characters, but Ophcrack Vista tables (free and special) failed to decrypt. Threw a few 4-,5-,6- and 7-character wordlists at it in a dictionary attack, those have failed as well.
-Trying the Cryptohaze CUDA Multi-Forcer, but won't know for sure for a while as it's running on a (very) modest 8600GS.
Am I doing something wrong or is it still just a matter of keeping at it? Does the SAM-dumping not work the same way with Win7? Incompatible rainbow tables? For a sub-8-character password I kinda expected it to have broken by now.
Thanks for any help you can give. |
|
|
|
|
Posted: Sat Oct 05, 2013 8:10 am |
|
|
sk8er |
Advanced user |
|
|
Joined: May 09, 2005 |
Posts: 64 |
|
|
|
|
|
|
|
|
|
|
|
Posted: Mon Nov 18, 2013 3:52 am |
|
|
zgfjxpxh |
Beginner |
|
|
Joined: Nov 14, 2013 |
Posts: 3 |
|
|
|
|
|
|
|
|
|
|
|
www.waraxe.us Forum Index -> Newbies corner
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum
|
All times are GMT
Page 1 of 1
|
|
|
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|
|