Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post Author Forum Replies Views Posted [desc]
    Thread: Kerberoasting-Attack / NTLM Hash cracking
Post: Kerberoasting-Attack / NTLM Hash cracking

Hi all, I just performed a few Kerberoasting Attacks in a lab and extracted the following RC4-HMAC Hash: Code: -- $krb5tgs$23$*svc_sql$kirk.enterprises$MSSQLSvc/SECOPS-LAB1-ADC.kirk.enterprises...
SailingTobi hashcat 5 3,971 08-04-2019, 06:15 PM
    Thread: Kerberoasting-Attack / NTLM Hash cracking
Post: RE: Kerberoasting-Attack / NTLM Hash cracking

royce Wrote: (08-04-2019, 08:12 PM) -- If you know for a fact that it's *truly* 12 random characters... then it's not crackable in a reasonable amount of time. If you do the math: https://www....
SailingTobi hashcat 5 3,971 08-04-2019, 11:51 PM
    Thread: Kerberoasting-Attack / NTLM Hash cracking
Post: RE: Kerberoasting-Attack / NTLM Hash cracking

Mem5 Wrote: (08-05-2019, 09:00 AM) -- SailingTobi Wrote: (08-04-2019, 11:51 PM) -- how do you define "truly" random? I assume passwords generated by a browser password plugin are not truly random. -...
SailingTobi hashcat 5 3,971 08-05-2019, 08:34 PM