12-29-2013, 04:55 AM
Feel bad for asking this as I know the answer is already here, but I've spent a few hours looking and think I must have brain block to get my arms around this. I see examples for other hashes, but not a "salted" NTLM hash. I am trying to crack a local Vista password. I've run fgdump and have my NTLM hash (there is no LM hash). I know the "root" of the password (ex: For a windows password "Password!23" I know it begins with "Password" just need to crack the remainder - same principle as a salt I gather), but just cannot figure out the correct steps to crack.
So my hash file from fgdump looks similar to this:
user.name:1003:NO PASSWORD*********************:<removed>:::
Thanks in advance for any help setting me straight!
So my hash file from fgdump looks similar to this:
user.name:1003:NO PASSWORD*********************:<removed>:::
Thanks in advance for any help setting me straight!