danped |
Beginner |

 |
|
Joined: Feb 23, 2008 |
Posts: 1 |
|
|
|
 |
 |
 |
|
I have extracted my hash using the software from loginrecovery.com, the result is below:
Administrator:500:5F,BB,19,09,63,4A,8E,08,08,77,99,50,39,6F,CB,BE,1B:
_3E,32,D4,F0,EF,EB,BA,71,94,A1,C2,F6,D2,44,72,CC,XX:::
I understand this is a LM hash but each part seems to have 34 characters whereas every cracking tool seems to accept 32 charater long hases. are these crackable?
5FBB1909634A8E0808779950396FCBBE1B
3E32D4F0EFEBBA7194A1C2F6D24472CCXX
Thanks.  |
|