NTLM hash, how practical is it?
#4
May I borrow this thread a little? I have a pwd dump file from Win Server 2008 and I need the admin pwd (the one who set the pwd died, unfortunately).

The file (say ha.hash) is on the format:
Administrator:500:NO PASSWORD*********************:[32-Char Hash]:::

How do I get oclhashcat to start cracking this password for me?


Messages In This Thread
NTLM hash, how practical is it? - by mido15 - 02-18-2014, 12:56 AM
RE: NTLM hash, how practical is it? - by Si2006 - 02-18-2014, 01:11 AM
RE: NTLM hash, how practical is it? - by ToJ - 02-22-2014, 01:34 AM
RE: NTLM hash, how practical is it? - by undeath - 02-22-2014, 11:20 AM
RE: NTLM hash, how practical is it? - by epixoip - 02-22-2014, 05:21 AM
RE: NTLM hash, how practical is it? - by ToJ - 02-22-2014, 12:38 PM
RE: NTLM hash, how practical is it? - by epixoip - 02-22-2014, 01:19 PM
RE: NTLM hash, how practical is it? - by ToJ - 02-22-2014, 01:49 PM
RE: NTLM hash, how practical is it? - by epixoip - 02-22-2014, 11:58 PM
RE: NTLM hash, how practical is it? - by ToJ - 02-23-2014, 10:31 AM
RE: NTLM hash, how practical is it? - by epixoip - 02-23-2014, 09:47 PM