Unfortunately my word list is not big enough.
Here is the hash: 0BBDE92B8E9B6E4A657761F0BC166DD2
Forum Thread: Can Someone Help Me Decrypt This NTLM Hash?
- Hot
- Active
-
Forum Thread: When My Kali Linux Finishes Installing (It Is Ready to Boot), and When I Try to Boot It All I Get Is a Black Screen. 8 Replies
3 days ago -
Forum Thread: HACK ANDROID with KALI USING PORT FORWARDING(portmap.io) 12 Replies
1 wk ago -
Forum Thread: Hydra Syntax Issue Stops After 16 Attempts 2 Replies
1 mo ago -
Forum Thread: Hack Instagram Account Using BruteForce 208 Replies
1 mo ago -
Forum Thread: Metasploit reverse_tcp Handler Problem 47 Replies
2 mo ago -
Forum Thread: How to Train to Be an IT Security Professional (Ethical Hacker) 22 Replies
3 mo ago -
Metasploit Error: Handler Failed to Bind 41 Replies
3 mo ago -
Forum Thread: How to Hack Android Phone Using Same Wifi 21 Replies
3 mo ago -
How to: HACK Android Device with TermuX on Android | Part #1 - Over the Internet [Ultimate Guide] 177 Replies
3 mo ago -
How to: Crack Instagram Passwords Using Instainsane 36 Replies
3 mo ago -
Forum Thread: How to Hack an Android Device Remotely, to Gain Acces to Gmail, Facebook, Twitter and More 5 Replies
3 mo ago -
Forum Thread: How Many Hackers Have Played Watch_Dogs Game Before? 13 Replies
3 mo ago -
Forum Thread: How to Hack an Android Device with Only a Ip Adress 55 Replies
4 mo ago -
How to: Sign the APK File with Embedded Payload (The Ultimate Guide) 10 Replies
4 mo ago -
Forum Thread: How to Run and Install Kali Linux on a Chromebook 18 Replies
5 mo ago -
Forum Thread: How to Find Admin Panel Page of a Website? 13 Replies
6 mo ago -
Forum Thread: can i run kali lenux in windows 10 without reboting my computer 4 Replies
6 mo ago -
Forum Thread: How to Hack School Website 11 Replies
6 mo ago -
Forum Thread: Make a Phishing Page for Harvesting Credentials Yourself 8 Replies
6 mo ago -
Forum Thread: Creating an Completely Undetectable Executable in Under 15 Minutes! 38 Replies
8 mo ago
-
How To: Use Burp & FoxyProxy to Easily Switch Between Proxy Settings
-
How To: Dox Anyone
-
How To: Hack Apache Tomcat via Malicious WAR File Upload
-
How To: Crack SSH Private Key Passwords with John the Ripper
-
How To: Crack Shadow Hashes After Getting Root on a Linux System
-
How To: Gain SSH Access to Servers by Brute-Forcing Credentials
-
How To: Scan for Vulnerabilities on Any Website Using Nikto
-
How To: Exploit EternalBlue on Windows Server with Metasploit
-
How To: Check if Your Wireless Network Adapter Supports Monitor Mode & Packet Injection
-
How To: Find Identifying Information from a Phone Number Using OSINT Tools
-
How to Hack Wi-Fi: Stealing Wi-Fi Passwords with an Evil Twin Attack
-
How To: Find Passwords in Exposed Log Files with Google Dorks
-
How To: Automate Wi-Fi Hacking with Wifite2
-
How To: Use Kismet to Watch Wi-Fi User Activity Through Walls
-
Hacking Windows 10: How to Dump NTLM Hashes & Crack Windows Passwords
-
How to Hack Bluetooth, Part 1: Terms, Technologies, & Security
-
How To: Write Your Own Bash Script to Automate Recon
-
How To: Exploit Remote File Inclusion to Get a Shell
-
How To: Advanced Techniques to Bypass & Defeat XSS Filters, Part 1
-
How To: Hunt Down Social Media Accounts by Usernames with Sherlock
5 Responses
Sorry, I am unable to crack something like that yet either. I'm still compiling a wordlist myself. I figure if I might have to wait several days, the wordlist that I use should cover nearly all of the bases, so I don't check the progress after 2-4 days and see that nothing was accomplished.
I'm using the "rockyou.txt" as a starting point and then adding wordlists to the pile as I find good ones. I was thinking to maybe get a bunch of lists together that'll cover wpa/wpa2 authentication passwords that're 8-32 characters in length (low letters,CAPITAL LETTERS, the numbers 0-9 and some symbols). After I get the wordlists together, I'll clean it of duplicates and sort it according to known statistical rules, etc. Then, I'll divide up the one large file into smaller ones that're around 5MB in size.
I posted to your thread because I was curious, is that hash a wpa/wpa2 hash? If so, is there a way that we can know (by the length of the hash) what the length of the password must be (or at least in a near ballpark)? I remember reading somewhere that most are 128 bit, but I can't recall what that number pertained to exactly.
Also, did you get that hash from one of the four packets in an EAPOL handshake? If so, did it come from the 3rd packet? What was the field name of that value (was it the (wireshark's middle pane) "> 802.1x Authentication > WPA Key Data:" field value?) ?
Sorry I only had questions and not an answer to trade for them. I do recall seeing an online site that supposedly could crack wpa/wpa2 encrypted keys, but that was a few weeks before I got into learning about this stuff and I haven't even been able to track down a decent site that's similar to it yet.
I've got about 2 dozen valid captures, but no way to crack any of them, so I'm compiling the wordlist and then I'm gonna try either aircrack-ng or hashcat.
I almost forgot to ask you... What's the total size of the wordlist that you tried, and what type of passwords will it cover (ie- an example answer might be something like, "It's 20GB total, divided into 5MB smaller files. I made some of it in Crunch and dll'd others to get the final list. It's geared toward authentication passwords that're 8-64 characters in length, and they can possibly be made of the letters/numbers/symbols: a-z, A-Z, 0-9, about %50 of the symbols on a QWERTY keyboard _/\";$#%&*().
Thanks for the reply, I got this hash from a SAM file. The password length is between 6-8 characters, and I think it only contains letters, capital letters and numbers.
Oh, I didn't remember SAM files, until you mentioned it. That's where Linux stores passwords, isn't it? I've read alot of stuff about a lot of different things but don't retain most of it unless it's something that actually pertains to my situation at the time.
Windows stores the passwords in SAM files and it is encrypted with LM or NT algorithms, mostly NT in newer windows versions.
Share Your Thoughts