Search Results
|
Post |
Author |
Forum |
Replies |
Views |
Posted
[asc]
|
|
|
Thread: Kerberoasting-Attack / NTLM Hash cracking
Post: RE: Kerberoasting-Attack / NTLM Hash cracking
Mem5 Wrote: (08-05-2019, 09:00 AM)
--
SailingTobi Wrote: (08-04-2019, 11:51 PM)
--
how do you define "truly" random? I assume passwords generated by a browser password plugin are not truly random.
-... |
|
SailingTobi |
hashcat
|
5 |
37,435 |
08-05-2019, 08:34 PM |
|
|
Thread: Kerberoasting-Attack / NTLM Hash cracking
Post: RE: Kerberoasting-Attack / NTLM Hash cracking
royce Wrote: (08-04-2019, 08:12 PM)
--
If you know for a fact that it's *truly* 12 random characters... then it's not crackable in a reasonable amount of time.
If you do the math:
https://www.... |
|
SailingTobi |
hashcat
|
5 |
37,435 |
08-04-2019, 11:51 PM |
|
|
Thread: Kerberoasting-Attack / NTLM Hash cracking
Post: Kerberoasting-Attack / NTLM Hash cracking
Hi all,
I just performed a few Kerberoasting Attacks in a lab and extracted the following RC4-HMAC Hash:
Code:
--
$krb5tgs$23$*svc_sql$kirk.enterprises$MSSQLSvc/SECOPS-LAB1-ADC.kirk.enterprises... |
|
SailingTobi |
hashcat
|
5 |
37,435 |
08-04-2019, 06:15 PM |