


If you dumped the hashes from the SAM or NTDS.DIT but you can’t crack them. Now also remember you might gain access to the LM hashes (pre Visa / Server 2008 mode). Or john –format=nt hashru1.txt –wordlist=rockyou.txt Oh and if you want to add some rules try adding some rules (you can use wildcards on rules as well!) hashcat.exe -m 1000 -r rules\_NSAKEY.v2.le Hashrun1.txt rockyou.txtĬool rules include, oneruletorulethemall and dive!

You should try and crack these: hashcat.exe -m 1000 Hashrun1.txt rockyou.txt Well, there’s a few tools available to you readily from a local perspective: : Encrypting an NT or LM Hash | Microsoft Docs Ok imagine this, you have got access to a file server and behold you find an unsecured, unencrypted backup of a domain controller (this isn’t made up I find these in networks sometimes!) and you yoink the NTDS.dit (or maybe it’s just a workstation SAM/SYSTEM file), you extract the hashes but now what, you need to crack those bad boys!Ĭheck out the MS docs on how NT or LM Hashes are computed(hashed)! – (thanks for spotting my mistake!)
