hashcat Forum

Full Version: Cracking an NTLM
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
I'm in a beginners ethical hacking class. We were given 50 hashes and were told that they came from a Windows system. Of the 50 I've cracked 49. They were all NTLM hashes. I've been told that they all should be crackable using the rockyou wordlist. I've tried hashcat -m 1000 hash.txt rockyou.txt and hashcat -m 1000 -r oneruletorulethemstill.rule hash.txt rockyou.txt . I did not crack the last one. Any thoughts of other hashcat commands I can try to crack this? I've tried other dictionaries as well just incase it was not in rockyou. I'm work in The-Distribution-Which-Does-Not-Handle-OpenCL-Well (Kali) through a VM connection. I appreciate any assistance.
You can try another ruleset.
Create a wordlist of the cracked ones and run rules against those. This could have been done during your first sessions using --loopback.
try a hybrid attack with dictionary increment to what you already have and add at the end to enumerate all the characters

hashcat -m 1000 -a 6 hash.txt rockyou.txt ?a?a?a?a?a?a -o result.txt --increment --increment-min=1 --increment-max=6