08-30-2013, 02:59 AM
(08-30-2013, 01:28 AM)magnum Wrote: It's not a bad hash. The problem is that the salt (username + domainname) is longer than the (optimized) max of 27 characters. JtR can crack it using the CPU format but not the GPU one.
Are you sure? I've tried john --format=netntlmv2 /root/Desktop/hash with the following and get "No password hashes loaded (see FAQ)".
username:$Administrator$WIN-HMH39596ABN$1122334455667788$80be64a4282577cf3b80503f4acb0e5a$0101000000000000f077830c70a4ce0114ddd5c22457143000000000020000000000000000000000:::::::
I'd rather use hashcat anyway, but would like to know how you cracked it.