Kerberoasting-Attack / NTLM Hash cracking
#6
(08-05-2019, 09:00 AM)Mem5 Wrote:
(08-04-2019, 11:51 PM)SailingTobi Wrote: how do you define "truly" random? I assume passwords generated by a browser password plugin are not truly random.
They are random, but predictible.
Are you talking about Dashlane? If yes, the default password is 12 characters using 'just' letters and digits (no symbols).
So hashcat mask would be ?u?l?d.
New equation would be : https://www.wolframalpha.com/input/?i=(2...2B10)%5E12     still huge..

Thanks for your reply. I just Passbolt in my lab. Cracking 8 char "random" passwords did work well.
Reply


Messages In This Thread
RE: Kerberoasting-Attack / NTLM Hash cracking - by SailingTobi - 08-05-2019, 08:34 PM