Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <80d7e4090909021635j51845b8cqd34894ff2d303e27@mail.gmail.com>
Date: Wed, 2 Sep 2009 17:35:22 -0600
From: Stephen John Smoogen <smooge@...il.com>
To: john-users@...ts.openwall.com
Subject: Re: Using Cain and Abel Hashes

On Wed, Sep 2, 2009 at 4:01 PM, Kaleb Hosie<kalebh@...essdeniedinc.com> wrote:
> Alright. For those that are not familiar with Cain and Abel, what it does is you can capture information traveling across the network. When a user logs on to Active Directory, it records the hash. The problem is that it isn't very efficient at cracking hashes (not to mention only for Windows). I've attached a hash as per Alexander's request. The password for this hash is: 2002
>
> The confidential statement is set on the Exchange server and I don't have access.
>
> PS: This email is not confidential (unless you want it to be) :P
> ________________________________________

Well I thought it might be a KRB5, but there must be something missing
from how I set it up or other data

XXX1:$krb5$DDobil$SPECTRA1.LOCAL$B0531432814115F216417AA118721FC83522175F1BDB357640862A77A613FCFC86BBF7BDE71BA26335B393E70EE3A76AF81DF098






-- 
Stephen J Smoogen.

Ah, but a man's reach should exceed his grasp. Or what's a heaven for?
-- Robert Browning


Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.