Waraxe IT Security Portal
Login or Register
September 22, 2024
Menu
Home
Logout
Discussions
Forums
Members List
IRC chat
Tools
Base64 coder
MD5 hash
CRC32 checksum
ROT13 coder
SHA-1 hash
URL-decoder
Sql Char Encoder
Affiliates
y3dips ITsec
Md5 Cracker
User Manuals
AlbumNow
Content
Content
Sections
FAQ
Top
Info
Feedback
Recommend Us
Search
Journal
Your Account
User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144

People Online:
Visitors: 416
Members: 0
Total: 416
Full disclosure
Stored XSS in "Edit Profile" - htmlyv2.9.9
Stored XSS in "Menu Editor" - htmlyv2.9.9
Backdoor.Win32.BlackAngel .13 / Unauthenticated Remote CommandExecution
Backdoor.Win32.CCInvader. 10 / Authentication Bypass
Backdoor.Win32.Delf.yj / Information Disclosure
SEC Consult blog :: Microsoft Windows MSI Installer - Repair to SYSTEM - A detailed journey (CVE-2024-38014) + msiscan tool release
Stored XSS to Account Takeover - htmlyv2.9.9
APPLE-SA-09-16-2024-10 macOS Ventura 13.7
APPLE-SA-09-16-2024-9 macOS Sonoma 14.7
APPLE-SA-09-16-2024-8 iOS 17.7 and iPadOS 17.7
APPLE-SA-09-16-2024-7 Xcode 16
APPLE-SA-09-16-2024-6 Safari 18
APPLE-SA-09-16-2024-5 visionOS 2
APPLE-SA-09-16-2024-4 watchOS 11
APPLE-SA-09-16-2024-3 tvOS 18
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index -> All other hashes -> LM and NTLM Hash decryption Goto page Previous1, 2, 3 ... 18, 19, 20 ... 76, 77, 78Next
Post new topicReply to topic View previous topic :: View next topic
PostPosted: Wed Oct 14, 2009 3:28 pm Reply with quote
JoelG
Beginner
Beginner
Joined: Oct 14, 2009
Posts: 1




Need help on this one:

- <Password>
<Username>Fam. Groeneveld</Username>
<Uid>1005</Uid>
<Sid>Unknown</Sid>
<LMHash>578B1CF0D05A0A2F93E28745B8BF4BA6</LMHash>
<NTHash>769EE539E0E327EDD72A53727C7D5A1A</NTHash>
</Password>
<info>Cannot mount /sys/block/sda/sda2</info>
<info>mounted /sys/block/sda/sda5</info>

Thanx
View user's profile Send private message
PostPosted: Wed Oct 14, 2009 4:28 pm Reply with quote
waraxe
Site admin
Site admin
Joined: May 11, 2004
Posts: 2407
Location: Estonia, Tartu




Plaintext of 769EE539E0E327EDD72A53727C7D5A1A is ,G0udv1s
View user's profile Send private message Send e-mail Visit poster's website
PostPosted: Thu Oct 15, 2009 12:26 am Reply with quote
IDN
Beginner
Beginner
Joined: Oct 13, 2009
Posts: 2




IDN wrote:
Your a legend if you can crack this one:

NT Hash, probably alphanumeric with no symbols, over 6 characters.

f2f1f1bcacefb8d0c3a78ee54785c112


So no plaintext for this one??
View user's profile Send private message
PostPosted: Fri Oct 16, 2009 11:25 pm Reply with quote
acis
Beginner
Beginner
Joined: Oct 17, 2009
Posts: 2




Administrator:500::86c72c394402c32b45178003119b57bb:::

Is it possible to get this in plaintext? Smile
View user's profile Send private message
Re: Please convert decode this
PostPosted: Sat Oct 17, 2009 7:51 am Reply with quote
shachola
Beginner
Beginner
Joined: Oct 03, 2009
Posts: 3




waraxe wrote:
shachola wrote:
Hi,
Please help me to decode this NT Hash. Last one week I'm trying this.
It will very much appreciable if Administrator could decode this.
Thanking you.
Regards
Shanavas.
- <Password>
<Username>admin</Username>
<Uid>1001</Uid>
<Sid>Unknown</Sid>
<LMHash />
<NTHash>2094797B3DE5DDE90CC905FF81CFBC43</NTHash>
</Password>
<info>mounted /sys/block/sda/sda3</info> Laughing


Plaintext of 2094797b3de5dde90cc905ff81cfbc43 is
nimdawiki




Thank you very much ... you are one of the greatest...
View user's profile Send private message
I know mine is a difficult one.
PostPosted: Mon Oct 19, 2009 4:23 am Reply with quote
gabrielv
Beginner
Beginner
Joined: Oct 07, 2009
Posts: 2




gabrielv wrote:
Please I need help to decript this NTLM hash

Adminitrator:500::C838F026AE81E120C1FEE9DB941EB9E6:::

Thanks a lot in advance


Hi waraxe,
I believe I know why you did not replied yet, my passowrd is a dificult one to decrypt. I know for sure the pasword is not a word, it contains many weird characters, the previous one had 13 characters, then even this time it is possible it contains more than 14 characteres, I hope does not. During this time I was myself trying to decript it as well, with no success at the moment.

First of all, if this help you, I extract the hash above with ophcrack. It is comming from the Windows XP SP2. Then with my limited knowlege in this area I believe it is an NTLN hash.

I was using John the ripper to decript that, but after a week I could not, but then I believe I was doing something wrong, due the standard John is not decrypting NT, only DES/BSDI/MD5/BF/AFS/LM. Then I decide to try using the contributed version trying to decrypt the NT. But it is not reconizing the format of the hash as showed above. Do you know how should be the format to pass to John for using NT format? Please guide me.

Thanks.
Gabriel.
View user's profile Send private message
PostPosted: Mon Oct 19, 2009 6:12 am Reply with quote
mrpeuch
Beginner
Beginner
Joined: Oct 19, 2009
Posts: 1




LM/NT
Code:
DD8B47A9BEBA5E0AAAD3B435B51404EE:335066771D8A007C680F1E3A1821B368


Less than 8, with symbols

Thanks!
View user's profile Send private message
PostPosted: Wed Oct 21, 2009 11:00 am Reply with quote
waraxe
Site admin
Site admin
Joined: May 11, 2004
Posts: 2407
Location: Estonia, Tartu




mrpeuch wrote:
LM/NT
Code:
DD8B47A9BEBA5E0AAAD3B435B51404EE:335066771D8A007C680F1E3A1821B368


Less than 8, with symbols

Thanks!


Plaintext of 335066771D8A007C680F1E3A1821B368 is 3m!lles
View user's profile Send private message Send e-mail Visit poster's website
PostPosted: Wed Oct 21, 2009 11:36 am Reply with quote
waraxe
Site admin
Site admin
Joined: May 11, 2004
Posts: 2407
Location: Estonia, Tartu




JoelG wrote:
Need help on this one:

- <Password>
<Username>Fam. Groeneveld</Username>
<Uid>1005</Uid>
<Sid>Unknown</Sid>
<LMHash>578B1CF0D05A0A2F93E28745B8BF4BA6</LMHash>
<NTHash>769EE539E0E327EDD72A53727C7D5A1A</NTHash>
</Password>
<info>Cannot mount /sys/block/sda/sda2</info>
<info>mounted /sys/block/sda/sda5</info>

Thanx


Plaintext of 769EE539E0E327EDD72A53727C7D5A1A is ,G0udv1s
View user's profile Send private message Send e-mail Visit poster's website
Re: I know mine is a difficult one.
PostPosted: Wed Oct 21, 2009 11:39 am Reply with quote
waraxe
Site admin
Site admin
Joined: May 11, 2004
Posts: 2407
Location: Estonia, Tartu




gabrielv wrote:
gabrielv wrote:
Please I need help to decript this NTLM hash

Adminitrator:500::C838F026AE81E120C1FEE9DB941EB9E6:::

Thanks a lot in advance


Hi waraxe,
I believe I know why you did not replied yet, my passowrd is a dificult one to decrypt. I know for sure the pasword is not a word, it contains many weird characters, the previous one had 13 characters, then even this time it is possible it contains more than 14 characteres, I hope does not. During this time I was myself trying to decript it as well, with no success at the moment.

First of all, if this help you, I extract the hash above with ophcrack. It is comming from the Windows XP SP2. Then with my limited knowlege in this area I believe it is an NTLN hash.

I was using John the ripper to decript that, but after a week I could not, but then I believe I was doing something wrong, due the standard John is not decrypting NT, only DES/BSDI/MD5/BF/AFS/LM. Then I decide to try using the contributed version trying to decrypt the NT. But it is not reconizing the format of the hash as showed above. Do you know how should be the format to pass to John for using NT format? Please guide me.

Thanks.
Gabriel.


NT hash algorithm does not have any known "shortcuts" like LM hash. So cracking the hash related to 13 or even 14 chars long password is hard task, practically mission impossible without using distributed cracking methods or specialized hardware.
View user's profile Send private message Send e-mail Visit poster's website
Crack HASH
PostPosted: Fri Oct 23, 2009 2:50 pm Reply with quote
wacker906
Beginner
Beginner
Joined: Oct 23, 2009
Posts: 2




please crack this lm and ntlm hash please....

LM Hash 644223FC1522DA48B1E69FBACF339C83

NTLM Hash B166968A0D6728045C41BCDF565EC71B



Thanks
View user's profile Send private message
PostPosted: Fri Oct 23, 2009 5:37 pm Reply with quote
acis
Beginner
Beginner
Joined: Oct 17, 2009
Posts: 2




waraxe wrote:

NT hash algorithm does not have any known "shortcuts" like LM hash. So cracking the hash related to 13 or even 14 chars long password is hard task, practically mission impossible without using distributed cracking methods or specialized hardware.


So, LT hashes greater than 14 char is feasible ? And i guess NT hashed would be too if there ever was a rainbow table big enough.

How many characters of plaintext is detectable in an NT hash with the biggest current "out in the wild" rainbow tables?
View user's profile Send private message
PostPosted: Fri Oct 23, 2009 5:58 pm Reply with quote
waraxe
Site admin
Site admin
Joined: May 11, 2004
Posts: 2407
Location: Estonia, Tartu




acis wrote:
waraxe wrote:

NT hash algorithm does not have any known "shortcuts" like LM hash. So cracking the hash related to 13 or even 14 chars long password is hard task, practically mission impossible without using distributed cracking methods or specialized hardware.


So, LT hashes greater than 14 char is feasible ? And i guess NT hashed would be too if there ever was a rainbow table big enough.

How many characters of plaintext is detectable in an NT hash with the biggest current "out in the wild" rainbow tables?


LM hashes are 14 chars max (2*7), no longer is possible.

Currently available Rainbow Table examples:

numeric 12
loweralpha 9
mixedalpha 8
mixedalphanumeric 7
all 6

There may be possible to generate and use RT-s for one char longer
passwords (for example loweralpha 10), but after that it's pure fantasy considering today's hardsware limits.

More serious cracking can be done using specialized hardware (NSA, CIA) or distributed cracking with botnets (blackhats).
View user's profile Send private message Send e-mail Visit poster's website
LM and NTLM HELP
PostPosted: Sat Oct 24, 2009 11:40 am Reply with quote
crunchtime
Beginner
Beginner
Joined: Oct 24, 2009
Posts: 3




Can someone crack this NT hash
Username : Ashley
LM : AAD3B435B51404EEAAD3B435B51404EE:
NTLM : 6A898B398FAE9BA856025CE67D4DEFE7

Please and Thank you

Crunch
View user's profile Send private message
PostPosted: Sat Oct 24, 2009 2:49 pm Reply with quote
ownaaja
Beginner
Beginner
Joined: Oct 24, 2009
Posts: 1




Can you crack this, please?

LM:366474ddeeac8b791bce3986b017c892
NT:d745a9e67fdf642edaa7268c3c4edb16
View user's profile Send private message
LM and NTLM Hash decryption
www.waraxe.us Forum Index -> All other hashes
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
All times are GMT
Page 19 of 78
Goto page Previous1, 2, 3 ... 18, 19, 20 ... 76, 77, 78Next
Post new topicReply to topic


Powered by phpBB © 2001-2008 phpBB Group



Space Raider game for Android, free download - Space Raider gameplay video - Zone Raider mobile games
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2024 Janek Vind "waraxe"
Page Generation: 0.051 Seconds