Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20060502145236.GA8567@openwall.com>
Date: Tue, 2 May 2006 18:52:36 +0400
From: Solar Designer <solar@...nwall.com>
To: john-users@...ts.openwall.com
Subject: Re: JtR & NTLMv2 passwords

On Tue, May 02, 2006 at 02:18:13PM +0200, Guillaume Arcas wrote:
> I'm a bit confused about the ability of JtR to crack Windows passwords that use
> NTLMv2 format.

This question itself is confusing.

My (limited) understanding is that NTLMv2 is a revision of the NTLM
authentication protocol as described, for example, here:

	http://davenport.sourceforge.net/ntlm.html

However, even when NTLMv2 is in use, the underlying password hashes
that are stored on Windows systems are plain NTLM, not NTLMv2 (there's
no such thing as an NTLMv2 password hash; instead, there are NTLMv2
challenge responses).

JtR supports LM and NTLM hashes (the latter with the contributed patch)
that are stored on Windows systems.

JtR does not support sniffed NTLM protocol challenge/response pairs.

-- 
Alexander Peslyak <solar at openwall.com>
GPG key ID: B35D3598  fp: 6429 0D7E F130 C13E C929  6447 73C3 A290 B35D 3598
http://www.openwall.com - bringing security into open computing environments

Was I helpful?  Please give your feedback here: http://rate.affero.net/solar

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.