|
Message-ID: <20110329162919736876.84baec95@gmail.com> Date: Tue, 29 Mar 2011 16:29:19 +0200 From: "websiteaccess@...il.com" <websiteaccess@...il.com> To: john-users@...ts.openwall.com Subject: NTLM hash, is it cracked ? Hi With JTR 1.7.6, I try to crack this hash (NTLM) Administrator:500:aad3b435b51404eeaad3b435b51404ee:72747c41396cbbec4203686b40a88670::: I did and get : iMac-de-xxx-xx:run xxxxx$ ./john -i:all ntlm.txt Loaded 1 password hash (LM DES [128/128 BS SSE2]) Warning: MaxLen = 8 is too large for the current hash type, reduced to 7 Warning: mixed-case charset, but the current hash type is case-insensitive; some candidate passwords may be unnecessarily tried more than once. (Administrator) thread: 0 guesses: 1 time: 0:00:00:00 c/s: 8960 trying: SHELARD - SPACY - Is JTR detected it's a NTLM hash (I see : password hash (LM DES [128/128 BS SSE2])) ? ? - Is the plaintext is "empty" ? W/A/
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.