Follow us on Twitter!
Never in the field of human conflict was so much owed by so many to so few. - Winston Churchill
Wednesday, April 23, 2014
Navigation
Home
HellBoundHackers Main:
HellBoundHackers Find:
HellBoundHackers Information:
Learn
Communicate
Submit
Shop
Challenges
HellBoundHackers Exploit:
HellBoundHackers Programming:
HellBoundHackers Think:
HellBoundHackers Track:
HellBoundHackers Patch:
HellBoundHackers Other:
HellBoundHackers Need Help?
Other
Members Online
Total Online: 23
Guests Online: 21
Members Online: 2

Registered Members: 82885
Newest Member: ConiBE
Latest Articles
View Thread

HellBound Hackers | Challenges | Basic

Author

How long Basic 12


Member

Your avatar

Posts:
Location:
Joined: 01.01.70
Rank:
Guest
Posted on 02-04-06 23:36
I found the hash and all, but I want to know how long it took everyone to crack it? Im using JTR by the way...




Edited by rex_mundi on 25-03-13 19:53
Author

RE: How long? Basic 12

Mr_Cheese




Posts: 2468
Location: Brighton, UK
Joined: 30.11.04
Rank:
Uber Elite
Posted on 02-04-06 23:52
it shouldnt take long.

a really simple dictionary file should pic it up.


http://www.hellboundhackers.org/
Author

RE: How long? Basic 12


Member

Your avatar

Posts:
Location:
Joined: 01.01.70
Rank:
Guest
Posted on 03-04-06 00:17
That is wierd... It has been 15 minutes, and it is still trying to crack... but also the wordlist isnt working correctly it comes up with this error...

Code
C:\Documents and Settings\Administrator\My Documents\john171d\JOHN1701\RUN>john-386 --wordlist=password.lst --rules passwd
Cannot load VDM IPX/SPX support
Loaded 1 password hash (Traditional DES [24/32 4K])
guesses: 0  time: 0:00:00:01 100%  c/s: 91843  trying: Forestin - Younggin

C:\DOCUME~1\ADMINI~1\MYDOCU~1\john171d\JOHN1701\RUN>





Author

RE: How long? Basic 12


Member

Your avatar

Posts:
Location:
Joined: 01.01.70
Rank:
Guest
Posted on 12-04-06 12:31
mine's taken 30mins so far... is there a good .lst file that i could use for jtr?


Author

RE: How long? Basic 12

SySTeM
Member

Your avatar

Posts: 1524
Location: England, UK
Joined: 27.07.05
Rank:
HBH Guru
Posted on 12-04-06 12:43
I used cains wordlist


img138.imageshack.us/img138/6527/sig2ak1.jpg
www.hellboundhackers.org/sig/r/2783.png

http://www.elites0ft.com/
Author

RE: How long? Basic 12


Member

Your avatar

Posts:
Location:
Joined: 01.01.70
Rank:
Guest
Posted on 12-04-06 14:33
...Grin


Author

RE: How long? Basic 12


Member

Your avatar

Posts:
Location:
Joined: 01.01.70
Rank:
Guest
Posted on 12-04-06 18:46
yep, having the same problem with JTR

just sat here twiddling me thumbs!

Angry




Edited by on 12-04-06 18:46
Author

RE: How long? Basic 12


Member

Your avatar

Posts:
Location:
Joined: 01.01.70
Rank:
Guest
Posted on 13-04-06 09:21
cains wordlist worked a treat! Cheers system.

^_^


Author

RE: How long? Basic 12


Member

Your avatar

Posts:
Location:
Joined: 01.01.70
Rank:
Guest
Posted on 13-04-06 10:25
@Zinya

I prefer to use JTR, but dont normally have to wait as long as this.

I can crack a full c*bill log faster than JTR is doing this one!

NVM grab anothe beer, sit back and wait!

B)


Author

RE: How long? Basic 12


Member

Your avatar

Posts:
Location:
Joined: 01.01.70
Rank:
Guest
Posted on 13-04-06 11:41
Grin
ok, just cracked it, for ne one else using JTR make sure you have a good wordlist and use

john -w=password.lst passwd.txt

john - the name of the JTR exe file could also be john-mmx

-w - use wordlist

password.lst - this is the name of your password list, dont use the standard one that comes with JTR as its probably too small

passwd.txt - where you put the user password hash

as long as you have a good list JTR will get it within a minute or less.

Cheers

Dantronix
Grin


Author

RE: How long? Basic 12


Member

Your avatar

Posts:
Location:
Joined: 01.01.70
Rank:
Guest
Posted on 16-04-06 20:57
and where is this hash? i tried including everything, all different kinds of /protected/.ht****** and the such but nothing works




Edited by on 16-04-06 21:16
Author

RE: How long? Basic 12


Member

Your avatar

Posts:
Location:
Joined: 01.01.70
Rank:
Guest
Posted on 17-04-06 09:18
i was able to crack it in 2 minutes using JTR and TheArgon (== 24MB passwrd.lst)
hint: get the newest version of JTR 1.7.1 (for win) or 1.7.2 (*nix) and change the password list in the config file. then you only need to enter this small line

john-386 passwd

where passwd == the fille that holds the user:hash info
hint: make sure you are in the right directory, every thing needs to be in the same dir.

hope that helped,
greetz
PostalCyber

ps. i did used my AMD athlon 3000+ Smile


Author

RE: How long? Basic 12


Member

Your avatar

Posts:
Location:
Joined: 01.01.70
Rank:
Guest
Posted on 17-04-06 11:39
yet again
and where is this hash? i tried including everything, all different kinds of /protected/.ht****** and the such but nothing works





Edited by on 17-04-06 11:39
Author

RE: How long? Basic 12


Member

Your avatar

Posts:
Location:
Joined: 01.01.70
Rank:
Guest
Posted on 19-04-06 00:48
is it an md5 hash?, or is a a DES hash, and in that case, what is the salt?




Edited by on 19-04-06 01:20
Author

RE: How long? Basic 12


Member

Your avatar

Posts:
Location:
Joined: 01.01.70
Rank:
Guest
Posted on 19-04-06 01:41
found the hash,
got JTR softwear...(linux), installed it, tryed doing as i read but am getting a error, tryed looking up the answer in the faqs...but no help there, can i get some help here?


[root@localhost root]# cd /root/john/run
[root@localhost run]# ./john -w=cains.lst /root/p.txt
No password hashes loaded
[root@localhost run]#