LM & NTLMv1 + challenge
#2
yeah, split the lm from the ntlm part, i think the reason why there is no such combined attack in hashcat, lm is obsolete for a very long time na dhashcat is very specialized

afterwards i would take the 7 part output and use a simple combine (combine the output with itself as the input) + rule attack (be sure there are standard rules like toggle word combined with toggle first char, as most passes will probably start with an uppercase)

i also made a simple python script which outputs every combination upper, lower, but mostly i dont need this script

you can also attack each lm on its own, this way you could see the two 7 char parts which belong to each other or you have to take a look yourself after cracking als parts
Reply


Messages In This Thread
LM & NTLMv1 + challenge - by jason81 - 12-19-2022, 02:53 PM
RE: LM & NTLMv1 + challenge - by Snoopy - 12-19-2022, 03:09 PM
RE: LM & NTLMv1 + challenge - by Chick3nman - 12-19-2022, 06:57 PM
RE: LM & NTLMv1 + challenge - by jason81 - 12-21-2022, 11:32 PM
RE: LM & NTLMv1 + challenge - by jason81 - 01-24-2023, 11:29 AM
RE: LM & NTLMv1 + challenge - by Chick3nman - 01-24-2023, 05:37 PM
RE: LM & NTLMv1 + challenge - by jason81 - 03-13-2023, 04:12 PM
RE: LM & NTLMv1 + challenge - by jason81 - 04-07-2023, 03:17 PM
RE: LM & NTLMv1 + challenge - by Chick3nman - 04-10-2023, 04:12 AM