background preloader

Passwords and Hashes

Facebook Twitter

Default Password List. Default Passwords Database. Electric Alchemy: Cracking Passwords in the Cloud: Breaking PGP on EC2 with EDPR. UPDATE 15 Nov 2010: Amazon announces "Cluster GPU Instances", again radically changing the economics of using EC2 for password cracking. We've had some questions about whether or not we are going to re-run our analysis using the EC2 GPU Instances. We may do so, but in the meantime have a look at stacksmashing.net. The have already got some numbers posted for cracking SHA1 on EC2/GPU. UPDATE 21 Dec 2009: Amazon announces "spot instances", radically changing the economics of using EC2 for password cracking. Cloud Computing has enabled some interesting projects: undertakings that wouldn't have been attempted without the cheap, flexible, easy to provision and simple to release computing power that "cloud" delivers.

We at EA are "pro-cloud" and have been assessing the security of various incarnations of cloud for some time now. When faced with the task of brute forcing PGP passphrases, we immediately thought of Elcomsoft. This was clearly unacceptable, so we looked to the cloud for salvation. Foofus Networking Services - Medusa::SMBNT. JoMo-Kun / jmk "AT" foofus "DOT" net The SMBNT module tests accounts against the Microsoft netbios-ssn (TCP/139) and microsoft-ds (TCP/445) services.

Besides testing normal passwords, this module allows Medusa to directly test NTLM hashes against a Windows host. This may be useful for an auditor who has aquired a sam._ or pwdump file and would like to quickly determine which are valid entries. Several "-m 'METHOD:VALUE'" options can be used with this module. The following are valid methods: AUTH, GROUP, GROUP_OTHER, PASS and NETBIOS. The following values are useful for these methods: (*) Default value The following examples demonstrate several uses of the SMBNT module: The default behavior is to test NATIVE Win2000 mode via TCP/445.

Be careful of mass domain account lockout with this module. FYI, this code is unable to test accounts on default XP hosts which are not part of a domain and do not have normal file sharing enabled. Medusa Documentation. LM/NTLM Challenge / Response Authentication - Foofus.Net Security Stuff. This documentation was written for John The Ripper and is included in the available jumbo patches. LM/NTLM Challenge / Response Authentication JoMo-Kun (jmk at foofus dot net) ~ 2010 Microsoft Windows-based systems employ a challenge-response authentication protocol as one of the mechanisms used to validate requests for remote file access. The configured/negotiated authentication type, or level, determines how the system will perform authentication attempts on behalf of users for either incoming or outbound requests.

These requests may be due to a user initiating a logon session with a remote host or, in some cases, transparently by an application they are running. In many cases, these exchanges can be replayed, manipulated or captured for offline password cracking. The following text discusses the available tools within the John the Ripper “Jumbo” patch for performing offline password auditing of these specific captured challenge-response pairs. Why might these exchanges be of interest? MD5 Crackers | Password Recovery | Wordlist Downloads. Online Hash Crack MD5 / LM / NTLM / SHA1 / MySQL - Passwords recovery - Reverse hash lookup Online - Hash Calculator. Password Exploitation Class. Password Exploitation Class This is a class we gave for the Kentuckiana ISSA on the the subject of password exploitation. The Password Exploitation Class was put on as a charity event for the Matthew Shoemaker Memorial Fund ( ).

The speakers were Dakykilla, Purehate_ and Irongeek. Lots of password finding and crack topics were covered. Hashcat, OCLHashcat, Cain, SAMDump2, Nir's Password Recovery Tools, Password Renew, Backtrack 4 R1, UBCD4Win and much more. My slides in PDF and PPTX format. The class video has been split into three parts: Part 1: Topics include: Why exploit local passwords?

Download: Part 2: The best single video out there for showing Hashcat and OCLHashcat. Password Storage Locations For Popular Windows Applications. Requested MD5 Hash queue. Sinbad Security Blog: MS SQL Server Password Recovery. For database admins, it is not a nightmare to handle with lost sql server password, which can be easily retrieved from application source code or just reset it in Enterprise Manager. But for a penetration tester, he should know where the passwords store, how to dump hashes, and crack them to gain more information. And it is necessary to audit the strength of sql server passwords, because weak sql passwords could cause system command execution remotely by a malicious hacker, compromising the application security. David Litchfiled has written a good paper about cracking sql server passwords in 2002. You should read it to understand the mechanism of hashes, and after that, practice the following instructions and tools. 1.

Sa 0x0100EA1ED32230A0DC42EE75F0A8D98234E26DDFF9720590BB687641F98DE93C45E05E6406A0E1BE291FA4D8205C1> 2. Split the hash as following: Launch your favorite hash crackers, here I use PasswordsPro, add hash then crack. 3.

Pass the Hash

Wordlists.