LM Hashes
#6
I would like to take my cracked LM hashes and use that as leverage to crack the full NTLM hash. For example let's say my LM password is PASSWOR and the NTLM has 10 characters.

Please correct me if I am wrong, but I believe I could use the following:

hashcat64 -m 1000 -a 3 hashfile.txt PASSWOR?a?a?a

Assuming I can run the command above, my question is this: How can I toggle the case for the PASSWOR part of the password while I am brute forcing? Or is it possible?
Reply


Messages In This Thread
LM Hashes - by slawson - 08-21-2019, 03:06 PM
RE: LM Hashes - by Mem5 - 08-21-2019, 05:33 PM
RE: LM Hashes - by atom - 08-22-2019, 11:16 AM
RE: LM Hashes - by slawson - 08-26-2019, 03:38 PM
RE: LM Hashes - by undeath - 08-26-2019, 04:01 PM
RE: LM Hashes - by slawson - 08-26-2019, 10:52 PM
RE: LM Hashes - by DanielG - 08-27-2019, 08:38 AM
RE: LM Hashes - by undeath - 08-27-2019, 10:14 AM
RE: LM Hashes - by slawson - 08-27-2019, 04:19 PM
RE: LM Hashes - by undeath - 08-27-2019, 04:23 PM
RE: LM Hashes - by slawson - 08-27-2019, 04:34 PM
RE: LM Hashes - by evilmog - 08-28-2019, 10:40 PM