NTLMV2 hash crack bruteforce
#1
How to cut NT client challenge to simple format for hacking? I try this directly as below

oclHashcat64.exe -m 5600 xxx::xxxxx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a 3 --status

I saw it is fast if I get simple hash

Also is there any way to crack NTLMV2 without Domain name in oclHashcat? I can do it in Cain


Messages In This Thread
NTLMV2 hash crack bruteforce - by gemgeorge - 01-29-2014, 05:29 PM
RE: NTLMV2 hash crack bruteforce - by gemgeorge - 01-30-2014, 05:18 PM
RE: NTLMV2 hash crack bruteforce - by magnum - 02-01-2014, 04:11 AM
RE: NTLMV2 hash crack bruteforce - by Rolf - 11-08-2014, 03:37 PM