[HELP] What's the input format of NTLM when using hashcat-plus ?
#10
Sr all,i bust few day , first i want to say "THANK" to all of you,i have some question about this problem

(02-07-2013, 07:55 AM)Kuci Wrote: Well, I see, LM is enabled. In aspect of time it's more advantageous to crack LM than NTLM, because LM is limited to 14 characters, it's made of two hashes with max. lenght of 7 characters. So, you can split your LM into two hashes in half.
Code:
XXXXXXXXXXXXXXXX
e08f82d6d2a3d8a6
Remember, both are long up to 7 characters, so if password is 14 characters long and you would try to bruteforce these hashes with small letters and numbers, there are 36^7 of combinations and you can crack both in one row. If you would use NTLM and your password would be 14 characters long, there are 36^14 combinations with same mask.
i did like you said (you can split your LM into two hashes in half.),but it's not run,if i don't mistake , it's alert "wrong format" when i split LM hash

Thank


Messages In This Thread
RE: [HELP] What's the input format of NTLM when using hashcat-plus ? - by unname2012 - 02-10-2013, 07:12 AM