power admin
+ Reply to Thread
Results 1 to 8 of 8

Thread: please help me

  1. #1
    Join Date
    Jun 2006
    Posts
    459

    please help me

    ok theres a password for the account on my computer.
    ive used many programs to try to do all sorts of things to get it but they dont work
    can someone help me find it...that is find, not remove or change
    these are the password hashes:
    LM : E*A4C*6F64B540B8C6EBE8776A*5*FEB
    NTLM : *62E82*BE**2225FEDF856E*8E*C65FE
    7h* L**7*57 c4n7 h4ck m*!
    Proud to have quit playing ®µÑȧ©ÅÞË

    If you write like a semi-literate boob you will very likely be ignored.
    Writing like a l**t script kiddie hax0r is the absolute l**t*st way to write!
    L0L

  2. #2
    Join Date
    Jun 2006
    Posts
    459
    any programs to s***est?
    7h* L**7*57 c4n7 h4ck m*!
    Proud to have quit playing ®µÑȧ©ÅÞË

    If you write like a semi-literate boob you will very likely be ignored.
    Writing like a l**t script kiddie hax0r is the absolute l**t*st way to write!
    L0L

  3. #3
    Join Date
    Sep 2006
    Posts
    1,649

    Well

    It looks like an MD hash, mostl likely MD5.

    If you like GUI programs, you can get Cain and Abel. It has an easy interface, and offers the use of dictionary attacks and brute forcing.

    If your comfortable with DOS programs, use John the Ripper. It is very good, in my opinion better-working than Cain, although I hate the DOS interface.

    I would recommend Cain in this case, becuase if it's a password to an account, it's most likely something dictionaryable, like a word, maybe with numbers. JTR works fine too, but there won't be much difference. IMO, JTR is just as good as Cain in dictionary attack, but faster at brute-forcing.

  4. #4
    Join Date
    Sep 2005
    Posts
    2,050
    Quote Originally Posted by Moonbat
    It looks like an MD hash, mostl likely MD5.
    There's really no way to tell what a hash like that is by looking at it - it's just a random hexadecimal string.

    But they're LM (LanManager) and NTLM hashes, like it says next to them. LM and NTLM are the form Windows login passwords are stored in.

    Just download cain and abel - it even allows you to import the hashes from the local system then crack them with either dictionary or brute force.

  5. #5
    Join Date
    Jun 2006
    Posts
    459
    i have done that and done every combination of brute force and dictionary that i can but it either takes a long time or doesnt work...could get it in 2* years with a full brute attack but i dont have that kind of time

    maybe its hidden somehow
    7h* L**7*57 c4n7 h4ck m*!
    Proud to have quit playing ®µÑȧ©ÅÞË

    If you write like a semi-literate boob you will very likely be ignored.
    Writing like a l**t script kiddie hax0r is the absolute l**t*st way to write!
    L0L

  6. #6
    Join Date
    Sep 2006
    Posts
    1,649

    ??

    2* years?!?
    I quote wikipedia..

    Although it is based on DES, a reasonably secure block cipher, the LM hash can easily be cracked due to two weaknesses in its implementation. First, passwords longer than 7 characters are divided into two pieces and each piece is hashed separately. Second, all lower case letters in the password are changed to upper case before the password is hashed. The first weakness allows each half of the password to be attacked separately. While there are 284 different passwords made of up to *4 mixed case letters and digits, there would be only 242 different *-7 character password pieces using the same character set. Restricting the character set to upper case letters and digits further reduces the number of possibilities for each half to 2*6. By mounting a brute force attack on each half separately, modern desktop machines can crack alphanumeric LM hashes in hours.
    This means that either the password <= 7 characters/digits, or your missing the other half. Assuming the first one is true, your time should be cut down alot. As said, a password with letters only will take a few hours. Numbers and other symbols should substaintially increase the time, but not up to 2* years.

    Wikipedia also talked about a program named Ophcrack

    Ophcrack is an Open Source (GPL License) program that cracks Windows LM hashes using rainbow tables. It can crack **.*% of alphanumeric passwords of up to *4 characters in usually a few seconds, and at most a few minutes. There is also a LiveCD version which automates the retrieval, decryption, and cracking of passwords from a Windows system.

    Starting with version 2.*, Ophcrack also cracks NT hashes.

  7. #7
    Join Date
    Sep 2005
    Posts
    2,050
    Quote Originally Posted by Moonbat
    2* years?!?
    I quote wikipedia..
    Wikipedia also talked about a program named Ophcrack
    In your quoted text about Ophcrack, it says it needs rainbow tables. They are huge precomputed tables of all the hashes for different plaintext strings, and usually are 50gb-200gb to download.

    I s***est you use a website like [url]www.rainbowtables.com[/url] or [url]www.milw0rm.com/cracker/[/url] to crack the hash using a rainbow table.

  8. #8
    Join Date
    Jun 2006
    Posts
    459
    lol yeah

    about the years thing thats just what the time approx was for all ascii chars and like *6 char long

    thanks for the program ref
    7h* L**7*57 c4n7 h4ck m*!
    Proud to have quit playing ®µÑȧ©ÅÞË

    If you write like a semi-literate boob you will very likely be ignored.
    Writing like a l**t script kiddie hax0r is the absolute l**t*st way to write!
    L0L

+ Reply to Thread

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts