|
Message-ID: <512F7298F309D84B9176E6420025C5E12103253594@exchange.autotrim.local> Date: Thu, 25 Feb 2010 16:08:34 -0500 From: Kaleb Hosie <kalebh@...essdeniedinc.com> To: "john-users@...ts.openwall.com" <john-users@...ts.openwall.com> Subject: RE: Using KRB5 I've tried doing this myself but unfortunately I haven't found a way to use the hashes I've collected in Cain and Abel. The best way I've been able to test domain passwords is by using the program called cachedump which unloads the cached passwords that Windows holds onto. The downside of this method is that you need to physically be at the users computer unlike Cain and Abel. If anyone knows of a better way in doing this, I would certainly be interested. ________________________________________ From: h3xstream [h3xstream.0@...il.com] Sent: Thursday, February 25, 2010 4:01 PM To: john-users@...ts.openwall.com Subject: [john-users] Using KRB5 Hi, I'm trying to start a simple brute force on Kerberos5 Hash (login on domain). The hash have been capture using Cain. Cain identify these as "Kerb5 PreAuth Hash". The data I got is in these two formats : domain\user [tab] hash (104 characters hexa) datetime [tab] ip server [tab] ip client [tab] user [tab] hash I have try many format for the password file but none had work. If I remove the parameter "--format=KRB5" it identify as Lotus 5.. This e-mail is confidential. If you are not the intended recipient, please notify the sender and delete this e-mail and any attachments without copying, disclosing or retaining it in any form. Ce courriel est confidentiel. Si vous n'etes pas le destinataire designe, veuillez en informer l'expediteur et supprimer ce courriel ainsi que tous fichiers joints sans les copier, divulguer ou conserver d'aucune facon.
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.