Click on the “Cracker” tab. On the left, click on the “LM & NTLM Hashes” and then click the big blue plus sign on the Cain toolbar. Make sure the “Import Hashes from a SAM database” button is checked. Choose the SAM file of your locked Windows installation and enter the bo...
I use hashcat (https://github.com/hashcat/hashcat/). Rule are supposed to be compatible for john and hashcat or others. 3 rules exists to adapt to hashing algorithm speed. Large for fast hash algorithms like MD5/NTLM/MySQL3. Small for slow hash algorithms like bcrypt. ...
using the NetNTLMv2 sample hash from the Hashcat wiki: $ cat example.hash admin::N46iSNekpT:08ca45b7d7ea58ee:88dcbe4446168966a153a0064958dac6:5c7830315c7830310000000000000b45c67103d07d7b95acd12ffa11230e0000000052920b85f78d013c31cdb3b92f5d765c783030 With a test wordlist of 4 passwords, ...
Strictly, 350 billion was the super-weak NTLM hash. Plain MD5 it was doing at 180 billion/s. Of course in “guesstimating” password security, a factor of 2 is much less than your margin of error. I note with a smirk that bcrypt choked it back to a mere 71,000/s. With all the...
The goal of this page is to make it very easy to convert your ZIP / RAR / 7zip archive files (.rar, .zip, .7z) to "hashes" which hashcat/john can crack How to use? More than easy, just select and upload your ZIP / RAR / 7zip archive file (Max size: 200 Mb). The hash...
master examples GetUserSPNs.ps1 GetUserSPNs.vbs LICENSE README.md extracttgsrepfrompcap.py kerberoast.py kerberos.py kirbi2john.py krbroast-pcap2hashcat.py pac.py tgsrepcrack.py Latest commit blitztide Fix crashing with invalid UTF8 characters ...