hashcat Forum
NOOB question regarding NTLM Hashes - Printable Version

+- hashcat Forum (https://hashcat.net/forum)
+-- Forum: Deprecated; Ancient Versions (https://hashcat.net/forum/forum-46.html)
+--- Forum: Very old oclHashcat-plus Support (https://hashcat.net/forum/forum-23.html)
+--- Thread: NOOB question regarding NTLM Hashes (/thread-2814.html)



NOOB question regarding NTLM Hashes - snailwraith - 11-13-2013

I am working with an NTLM hash that was extracted using Quarks PW dump from a domain controller. This is a case where someone locked the keys in the car and now we need to get in. By using a combination of the registry keys and the AD database, I was able to extract the hashes and put them in a text format. I was hoping to use hashcat to crack them, but I keep getting a line exception error when running against the hash.

Below is an example of the command running:
oclHashcat-plus64.exe --hash-type 1000 --attack-mode 3 user:0000:#D##########D####D#DD#D####DDD##:##D##D#DDD###D##D#D###D##D#DD##D:

I am using the hashcat gui for simplicity on a Windows system.

When running the program I am getting a line length exception on every line, when attempting to pull from the text file that was created.

Assistance would be appreciated.


RE: NOOB question regarding NTLM Hashes - epixoip - 11-13-2013

pwdump format is not supported, you need to specify just the nthash


RE: NOOB question regarding NTLM Hashes - mastercracker - 11-13-2013

Quote:user:0000:#D##########D####D#DD#D####DDD##:##D##D#DDD###D##D#D###D##D#DD##D:
This is the only part that you need:
user:0000:#D##########D####D#DD#D####DDD##:##D##D#DDD###D##D#D###D##D#DD##D: