Shrine Posted December 15, 2015 Share Posted December 15, 2015 So I was wondering if anyone can help me with this hash: >cisdtech:1000:aad3b435b51404eeaad3b435b51404ee:a28eb40a206a867caed5d6eefc49d93c::: The online hash cracker could not get it and john just wanted to take 30000000000 hours on my laptop. Any tricks or tips? Quote Link to comment Share on other sites More sharing options...
barry99705 Posted December 15, 2015 Share Posted December 15, 2015 Yea, log into whatever you're trying to crack and just change the password. Quote Link to comment Share on other sites More sharing options...
Mr-Protocol Posted December 15, 2015 Share Posted December 15, 2015 I'm guessing that's from a Windows machine? Hopefully from a legit pen-test. Quote Link to comment Share on other sites More sharing options...
Shrine Posted December 15, 2015 Author Share Posted December 15, 2015 I'm guessing that's from a Windows machine? Hopefully from a legit pen-test. Yes, From a legit pentest. And yes from a legit pentest. This is what john had to say about it. >root@ElJeffe:~# john /PWcrack/Hashes/CISDTECH.txt >Warning: detected hash type "LM", but the string is also recognized as "NT" >Use the "--format=NT" option to force loading these as that type instead >Warning: detected hash type "LM", but the string is also recognized as "NT-old" >Use the "--format=NT-old" option to force loading these as that type instead >Using default input encoding: UTF-8 >Using default target encoding: CP850 >Loaded 1 password hash (LM [DES 128/128 AVX-16]) >No password hashes left to crack (see FAQ) >root@ElJeffe:~# So I tried: >john --fork=4 --format=NT-old /PWcrack/Hashes/CISDTECH.txt Quote Link to comment Share on other sites More sharing options...
Mr-Protocol Posted December 15, 2015 Share Posted December 15, 2015 I would suggest you do some research into the output you have. There are actually two different hashes there. But an experienced pentester should already know that ;) Quote Link to comment Share on other sites More sharing options...
Shrine Posted December 15, 2015 Author Share Posted December 15, 2015 I would suggest you do some research into the output you have. There are actually two different hashes there. But an experienced pentester should already know that ;) Will do, However the first hash is the windows deafualt hash for a "empty password" It is an NT hash . Its the seccond one thats being a pain. (I am a noob pentester by the way ;P Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.