Feel bad for asking this as I know the answer is already here, but I've spent a few hours looking and think I must have brain block to get my arms around this.  I see examples for other hashes, but not a "salted" NTLM hash.  I am trying to crack a local Vista password.  I've run fgdump and have my NTLM hash (there is no LM hash).  I know the "root" of the password (ex: For a windows password "Password!23"  I know it begins with "Password" just need to crack the remainder - same principle as a salt I gather), but just cannot figure out the correct steps to crack.  
So my hash file from fgdump looks similar to this:
user.name:1003:NO PASSWORD*********************:<removed>:::
Thanks in advance for any help setting me straight!
	
	
	
	
So my hash file from fgdump looks similar to this:
user.name:1003:NO PASSWORD*********************:<removed>:::
Thanks in advance for any help setting me straight!
 
 

 

