Please note, this is a STATIC archive of website hashcat.net from October 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post Author Forum Replies Views [desc] Posted
    Thread: Kerberoasting-Attack / NTLM Hash cracking
Post: Kerberoasting-Attack / NTLM Hash cracking

Hi all, I just performed a few Kerberoasting Attacks in a lab and extracted the following RC4-HMAC Hash: Code: -- $krb5tgs$23$*svc_sql$kirk.enterprises$MSSQLSvc/SECOPS-LAB1-ADC.kirk.enterprises...
SailingTobi hashcat 5 3,974 08-04-2019, 06:15 PM
    Thread: Kerberoasting-Attack / NTLM Hash cracking
Post: RE: Kerberoasting-Attack / NTLM Hash cracking

royce Wrote: (08-04-2019, 08:12 PM) -- If you know for a fact that it's *truly* 12 random characters... then it's not crackable in a reasonable amount of time. If you do the math: https://www....
SailingTobi hashcat 5 3,974 08-04-2019, 11:51 PM
    Thread: Kerberoasting-Attack / NTLM Hash cracking
Post: RE: Kerberoasting-Attack / NTLM Hash cracking

Mem5 Wrote: (08-05-2019, 09:00 AM) -- SailingTobi Wrote: (08-04-2019, 11:51 PM) -- how do you define "truly" random? I assume passwords generated by a browser password plugin are not truly random. -...
SailingTobi hashcat 5 3,974 08-05-2019, 08:34 PM