Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <AANLkTimsQm1H6obxr6+sQ2VOBf9wnxXPu-9f-R+pzS_H@mail.gmail.com>
Date: Mon, 29 Nov 2010 07:42:29 -0500
From: Rich Rumble <richrumble@...il.com>
To: john-users@...ts.openwall.com
Subject: Fwd: pwgen

2010/11/28 Brad Tilley <brad@...ystems.com>:
> Does this help:
>
> command: pwgen -1cn 8 1000
> pwgen version: Version: 2.06-1ubuntu2
> OS: Linux ubuntu 2.6.32-26-generic #47-Ubuntu SMP x86_64 GNU/Linux
>

I made all the hashes Brad generated into NTLM with one line (it's a
hack, I know)
 while read line; do  echo -n "$line" | sed -r 's,(.),\1\x00,g' |
openssl md4; done < hashes-in.txt >output.txt

Here is a pwdump formatted file (attached)

I also made a PHP script that will output a file of plain-text passes into
NTLM and pwdump-formatted output.

<?php
header("Content-Type: text/plain");
function NTLMHash($Input) {
  $Input=iconv('UTF-8','UTF-16LE',$Input);
  //$MD4Hash=bin2hex(mhash(MHASH_MD4,$Input));
  $MD4Hash=hash('md4',$Input);
  $NTLMHash=strtoupper($MD4Hash);
  // Return the result
  return($NTLMHash);
};
$array = file("hashes-in.txt");
$a = 0;
foreach ($array as $line) {
   $output = NTLMHash(trim($line));
   //Just use this line to get hashes only for NTLM
   //print $output . "\n";
   //Formatted PWDump output
  print "user-" . $a++ . ":0:***********NO PASSWORD**********:" .
$output . ":::" . "\n";
}
?>


-rich

Download attachment "output.zip" of type "application/zip" (24276 bytes)

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.