NTLM with known "salt"
#1
Feel bad for asking this as I know the answer is already here, but I've spent a few hours looking and think I must have brain block to get my arms around this. I see examples for other hashes, but not a "salted" NTLM hash. I am trying to crack a local Vista password. I've run fgdump and have my NTLM hash (there is no LM hash). I know the "root" of the password (ex: For a windows password "Password!23" I know it begins with "Password" just need to crack the remainder - same principle as a salt I gather), but just cannot figure out the correct steps to crack.

So my hash file from fgdump looks similar to this:

user.name:1003:NO PASSWORD*********************:<removed>:::

Thanks in advance for any help setting me straight!


Messages In This Thread
NTLM with known "salt" - by Barn - 12-29-2013, 04:55 AM
RE: NTLM with known "salt" - by radix - 12-29-2013, 04:58 AM