1
Hacking and Security / Re: Mass Hash Cracking ;)
« on: November 25, 2014, 08:53:07 AM »My notes on de-hashing passwords...@FTPPalace, see tip above by Comm4nd0. Honestly bro, anyone with 2 weeks of password cracking experience knows that you have a NTLM hash under 15 characters long (this can be confirmed by splitting the hash into two parts, and cracking the first one or second one). If the password is less than 15 (or 14, can't remember the limit windows puts on hashes before they get weird), the first part of the hash will crack as a blank, and is generally (not always) aad3b435b51404eeaad3b435b51404ee.
use: hash-identifier
to find out the hash type.
This leaves you with a cool trick to stop wasting your time...crack the second part of the hash. Now, if you get something different for the first part of the hash that can mean one of a couple of things.
!) The password is longer than 15 characters and you still need to crack both parts individually
2) The password is salted and you need the system file to separate the salt.
You know now what needs to be done for NTLM hashes. I recommend looking at the tut Z3R0 posted about m0rph's assumption-based password cracking theory, because it's quite good. I find it amazing he developed a method for dramatically reducing the cracking time of complex 8+ char passwords without having to buy ridiculous hardware. The dude must have been something else.
https://evilzone.org/tutorials/assumption-based-gpu-hash-cracking-theory/