|
Message-ID: <20120913232526.GB1885@openwall.com> Date: Fri, 14 Sep 2012 03:25:26 +0400 From: Solar Designer <solar@...nwall.com> To: john-users@...ts.openwall.com Subject: Re: Help for JTR On Thu, Sep 13, 2012 at 07:00:00PM +0200, Helmut Hullen wrote: > >>>> The hash input to john is as follows: > >>>> adm:1003:f5ed24301452410f0f802f643692aaef:3c4ac740fc1ecbee5da191a1 > >>>> 4f0cdc29::: > > >> Neither "jtr" nor "ophcrack" recognized any password for this line. > > > We need to know if these are the actual hashes Jonathan is trying to > > crack, or if he modified them for posting to the list. > > They seem to be invalid. "ophcrack" should recognize the password at > least for the first of the two lines. I know what "ophcrack" usually > writes into the log file. You're assuming that if they're valid, they are most likely crackable with the rainbow tables that you have. Since they're not, you have no way to tell if they're valid hashes or not. All we can say is that they're correctly looking, but are not easily crackable. Since almost all LM hashes for real passwords are easily crackable (over 99%), this tells us that at least the LM hash portion is almost certainly not real. Probably the NT is not real as well. We're just not 100% certain of any of that. We're like 99% certain. Alexander
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.