Home page logo

pen-test logo Penetration Testing mailing list archives

Re[2]: Using schmoo rainbow tables with rcrack
From: Ghirai <ghirai () ghirai com>
Date: Sat, 1 Apr 2006 12:14:19 +0300

Hello Victor,

Saturday, April 1, 2006, 5:37:51 AM, you wrote:


The problem you have is based on the fact that you are trying to break 2 Lan
Manager hashes, not one. Remember that Lan Manager splits passwords into two
independent hashes and then sticks them together. You can do two things: use
the pwdump format in which as an extra bonus rcrack will break the lowercase
letters by bruteforcing the NTLM hash (only after it breaks both hashes) or
you can use the hash list (-l) or individual hashes (-h) by separating your
hashes into two separate ones. For example, the hash for the word "password"
would be E52CAC67419A9A224A3B108F3FA6CB6D where E52CAC67419A9A22 would be
broken into "passwor" and 4A3B108F3FA6CB6D into "d".

You can use "rcrack alpha/*rt -h E52CAC67419A9A22" to break the first half.

Good luck,

Thanks for the info.

I also found out that i was using wrong charsets, the charset for
'alpha' also contained a space.

Best regards,

This List Sponsored by: Cenzic

Concerned about Web Application Security? 
As attacks through web applications continue to rise, you need to proactively 
protect your applications from hackers. Cenzic has the most comprehensive 
solutions to meet your application security penetration testing and 
vulnerability management needs. You have an option to go with a managed 
service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). 
Download FREE whitepaper on how a managed service can help you: 
And, now for a limited time we can do a FREE audit for you to confirm your 
results from other product. Contact us at request () cenzic com

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]