|
Message-ID: <20060502145236.GA8567@openwall.com> Date: Tue, 2 May 2006 18:52:36 +0400 From: Solar Designer <solar@...nwall.com> To: john-users@...ts.openwall.com Subject: Re: JtR & NTLMv2 passwords On Tue, May 02, 2006 at 02:18:13PM +0200, Guillaume Arcas wrote: > I'm a bit confused about the ability of JtR to crack Windows passwords that use > NTLMv2 format. This question itself is confusing. My (limited) understanding is that NTLMv2 is a revision of the NTLM authentication protocol as described, for example, here: http://davenport.sourceforge.net/ntlm.html However, even when NTLMv2 is in use, the underlying password hashes that are stored on Windows systems are plain NTLM, not NTLMv2 (there's no such thing as an NTLMv2 password hash; instead, there are NTLMv2 challenge responses). JtR supports LM and NTLM hashes (the latter with the contributed patch) that are stored on Windows systems. JtR does not support sniffed NTLM protocol challenge/response pairs. -- Alexander Peslyak <solar at openwall.com> GPG key ID: B35D3598 fp: 6429 0D7E F130 C13E C929 6447 73C3 A290 B35D 3598 http://www.openwall.com - bringing security into open computing environments Was I helpful? Please give your feedback here: http://rate.affero.net/solar
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.