Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post Author Forum Replies Views Posted [asc]
    Thread: HELP/GUIDE: LM Brute Force
Post: RE: HELP/GUIDE: LM Brute Force

So I did the following to get the hashes using NTDSXtract, I ended up just using a debian virtual machine as I could not get libesedb to compile with cygwin or visual studio 2013. I used the guide ...
madcatter Old oclHashcat Support 6 20,655 04-25-2014, 06:59 PM
    Thread: HELP/GUIDE: LM Brute Force
Post: RE: HELP/GUIDE: LM Brute Force

epixoip Wrote: (04-25-2014, 11:23 AM) -- hash corruption seems far more likely. -- Just saw your post after posting my response to atom, I guess I am doing something wrong extracting the hashes fro...
madcatter Old oclHashcat Support 6 20,655 04-25-2014, 11:44 AM
    Thread: HELP/GUIDE: LM Brute Force
Post: RE: HELP/GUIDE: LM Brute Force

Thanks for the reply =] atom Wrote: (04-25-2014, 10:59 AM) -- Thanks for the details. As not a single hash was cracked there must be something wrong. Can you crack the LM and NTLM example hash fro...
madcatter Old oclHashcat Support 6 20,655 04-25-2014, 11:36 AM
  Information Thread: HELP/GUIDE: LM Brute Force
Post: HELP/GUIDE: LM Brute Force

Hello! I am trying to recover some passwords from a Windows SBS 2003, Active Directory database, and I am unable to successfully get the clear text passwords from the LM Hashes, I have written this...
madcatter Old oclHashcat Support 6 20,655 04-25-2014, 03:29 AM