Cracking NTLM using LM Hashes
#2
when you still have your lm-hash input file you can use
.\hashcat.exe --show -m3000 --outfile-format=2 mode-3000-hashfile.txt
to show the combined real LM passwords

otherwise, yeah, you will need to combine the parts from the potfile, you can utilize priceprocessor or combinator-attack for this, the problem as mentioned will be switching all combinations for the letters in a word, i wrote myself an pythonscript for this, but didnt find it right now (i think there will be an answer on github or stackoverflow)

next problem you have to cope with, LM is cutting input at position 14, so when your output of combining the passes from potfile is exactly 14 , the "real" password can or could be longer than this, so when running into not cracking all hashes you will need to combine your input with a appended mask
Reply


Messages In This Thread
Cracking NTLM using LM Hashes - by alex#23 - 12-12-2023, 01:51 PM
RE: Cracking NTLM using LM Hashes - by Snoopy - 12-12-2023, 03:25 PM