Please note, this is a STATIC archive of website hashcat.net from October 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post Author Forum Replies [asc] Views Posted
  Information Thread: HELP/GUIDE: LM Brute Force
Post: HELP/GUIDE: LM Brute Force

Hello! I am trying to recover some passwords from a Windows SBS 2003, Active Directory database, and I am unable to successfully get the clear text passwords from the LM Hashes, I have written this...
madcatter Old oclHashcat Support 6 20,655 04-25-2014, 03:29 AM
    Thread: HELP/GUIDE: LM Brute Force
Post: RE: HELP/GUIDE: LM Brute Force

Thanks for the reply =] atom Wrote: (04-25-2014, 10:59 AM) -- Thanks for the details. As not a single hash was cracked there must be something wrong. Can you crack the LM and NTLM example hash fro...
madcatter Old oclHashcat Support 6 20,655 04-25-2014, 11:36 AM
    Thread: HELP/GUIDE: LM Brute Force
Post: RE: HELP/GUIDE: LM Brute Force

epixoip Wrote: (04-25-2014, 11:23 AM) -- hash corruption seems far more likely. -- Just saw your post after posting my response to atom, I guess I am doing something wrong extracting the hashes fro...
madcatter Old oclHashcat Support 6 20,655 04-25-2014, 11:44 AM
    Thread: HELP/GUIDE: LM Brute Force
Post: RE: HELP/GUIDE: LM Brute Force

So I did the following to get the hashes using NTDSXtract, I ended up just using a debian virtual machine as I could not get libesedb to compile with cygwin or visual studio 2013. I used the guide ...
madcatter Old oclHashcat Support 6 20,655 04-25-2014, 06:59 PM