What came up? Nothing but 'lame' and 'l8j4' and they were only found because Ophcrack bruteforces from 1-4 characters. So, I installed Windows 7 in a VM, setup up some lame test accounts:Username:PasswordTest:sevenlame:lamelamepass:lamepassyourmom:yourmom18j4:18j4I then ran it through Ophcrack. With more and more people using Vista and Win7, I decided it was time to get my NT hash cracking on. Yet, it didn't.I was just wondering, if any of you have cracked some NT hashes, be it from Vista or Windows 7, did you use Ophcrack? What was the password? What tables did you use? And, how long did it take?If you use something other than Ophcrack (JTR, Cain, etc.), what do you use? What tables do you use and how large are they? On average, how long does it take you to crack an NT hash? I know Ophcrack exploits the weak LM hash used in XP and preceding, while the Vista Free tables are based on a dictionary and mutations, but I still figured that it would find all of those lame passwords. ![]() I was quite surprised that the other passwords couldn't be found. ![]()
0 Comments
Leave a Reply. |