hybrid attack Netntlm too slow
#3
(10-26-2018, 03:35 PM)undeath Wrote: your are doing something weird. Why are you using -a6 with a 7 char mask when you're trying to crack a LM hash? The plaintext cannot be longer than 7 chars.

(10-26-2018, 03:30 PM)Marsupilami Wrote: but then the estimated time is always 0 sec.

When piping candidates hashcat cannot calculate the estimated time.

ah ok thats confusing yes i see..

 what i want to to

The plaintext password(of course I know it) is M%rFofT!:W$u.M

The first part M%RFoFT i got with rainbowtables. Because of the design of LM Algorithm its all Uppercase
M%RFOFT


Unfortunately hashcat don't support the old NetLM- Algorithm so i have to crack the NetNTLM-Part of it which is case sensitive

So i created a textfile with all possibilities as described above and want to Brute force the remaining 7 chars a?a?a?a?a?a?a? that i get the 14 chars NTLMv1 password

hashcat -a 6(hybrid attack dict+mask) possibilities.txt ?a?a?a?a?a?a?a -m 5500 (NetNTLMv1)

I expect something like this:
M%RFoFTsH!:KI%


Messages In This Thread
hybrid attack Netntlm too slow - by Marsupilami - 10-26-2018, 03:30 PM
RE: hybrid attack Netntlm too slow - by undeath - 10-26-2018, 03:35 PM
RE: hybrid attack Netntlm too slow - by Marsupilami - 10-26-2018, 03:47 PM
RE: hybrid attack Netntlm too slow - by undeath - 10-26-2018, 03:58 PM
RE: hybrid attack Netntlm too slow - by undeath - 10-27-2018, 10:44 AM
RE: hybrid attack Netntlm too slow - by philsmd - 10-27-2018, 09:12 PM
RE: hybrid attack Netntlm too slow - by philsmd - 10-27-2018, 10:44 PM