|
Message-Id: <DE448A24-8679-47F4-A31D-BCA38E695CAC@xmcopartners.com> Date: Fri, 17 Oct 2008 20:49:15 +0200 From: Yannick HAMON <yannick.hamon@...opartners.com> To: john-users@...ts.openwall.com Subject: [ lm2ntcrack ] A simple tool to crack instantly Microsoft Windows NT Hash (MD4) when the LM Password is known. Hi everybody, I want to share with you a simple tool that I have developped : "lm2ntcrack". I hope that it will help some guy... http://www.xmcopartners.com/lm2ntcrack/index.html This tool provides a simple way to crack instantly Microsoft Windows NT Hash (MD4) when the LM Password is known. It is entirely written in perl, so its easily ported and installed. This program must be used with the password cracker "John the Ripper" http://www.openwall.com/john/ * Why lm2ntcrack ?? I've often encountered a problem during Windows penetration testing and password assessment. On the one hand, launching my favorite password cracker during few minutes on the dumped Windows passwords hashes, permits to crack many LM passwords but cracked password cannot be used as is (uppercase version of the Windows password). On the other hand, password cracking on NT hash is quiet long and after few days it cracks only some password. Here is my big deal. I've got the LM password but it is only in UpperCase because LM Hashes are not case sensitive. So, these passwords cannot be reuse in this form. * Example: Password cracker output for "Administrator" account : => LM password is ADMINISTRAT0R. => NT password is ?????????????. I'm not so lucky because the case-sensitive password isn't "administrat0r" or "Administrat0r". So I cannot use this to connect on the audited Windows system. This password contains 13 characters but launching my password cracker on the NT hash is a waste of time and there is a poor chance of success. * Note : 13 characters : 1 number + 12 case-sensitives letters => 2^12 = 4096 choices (DAMN IT, I cannot test them all manually) ... I need a TOOL !!!! Not a magic one but a simple tool which can do this task for me. In this example, "lm2ntcrack" will generate the 4096 possibilities for the password "ADMINISTRAT0R" and, for each one, the associated NT MD4 hash. Then, search for matching with the dumped hash. Estimated time : < 2 seconds to crack more than 1200 NT Hashes (it is very fast instead of Perl !!! lol) Enjoy !!!! * Example : [yann@...opartners:~/lm2ntcrack]$ time perl lm2ntcrack.pl -v - l="AZERTY123$" -n="81CD1A1C4CBCE05C0F8D411ACEC7587F" ############################################################################ # NT Password cracker from LM password # Version : 0.5a - Oct 2008 # By Yannick HAMON <yannick.hamon@...opartners.com> # Homepage : http://www.xmcopartners.com ############################################################################ [INFO] : "AZERTY123$" has 10 character(s) but contains 4 special(s) char(s) and/or integer(s) [INFO] : => 64 words will be generated ...... OK !! [INFO] : Crack NT password from "AZERTY123$" and NT HASH "81CD1A1C4CBCE05C0F8D411ACEC7587F" [CRACKED] AZERTY123$ => azERTy123$ real 0m0.033s user 0m0.025s sys 0m0.007s * NB : Recently, after developped this fabulous TOOL, I've found an old post on "openwall mailing-list" : http://www.openwall.com/lists/john-users/2006/07/08/2 This post explains how to crack NT hash from LM password with john-the- ripper (need to modify john's configuration file to use [List.Rules:NT] section and stop running john on the LM hashes). john -show pwfile | cut -d: -f2 > cracked john -w=cracked -rules -format=nt pwfile john -show -format=nt pwfile One known problem with this approach is that it'll fail for passwords containing colons (':' is cut delimiter). This problem does not impact "lm2ntcrack" and you can use "lm2ntcrack" while john is cracking LM hashes. -- Yannick Hamon <yannick.hamon@...opartners.com> IT Security Consultant Xmco Partners | Security Research Labs http://www.xmcopartners.com -- To unsubscribe, e-mail john-users-unsubscribe@...ts.openwall.com and reply to the automated confirmation request that will be sent to you.
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.