Quantcast
Channel: hashcat Forum - All Forums
Viewing all articles
Browse latest Browse all 7673

NTLM Issues [Solved]

$
0
0
I seem to be having an issue with cracking some of my NTLM hashes.

Currently I have dumped a 2008R2 SAM using VSS in combination with QwarksPWDump util to get it into a txt file.

They appear like this example:
PHP Code:
user:4265:AA############################EE:18####################F1D2A5CB06::: 

I have removed:
PHP Code:
user:salt_idk?:AA############################EE: 

Leaving me with what I think is the NTLM:
PHP Code:
18####################F1D2A5CB06 

I use the following command:
Code:
cudaHashcat64.exe -m 1000 -o recovered.txt hashes.txt wordlist.txt

I am unable to crack any of the passwords even though I have set my own password in AD manually and placed it in the wordlist.txt I did add in the example hashcat NTLM and it was able to retrieve it fine. I dont get any errors either about line length.

My impression is that the export is suspect. Any ideas?

Viewing all articles
Browse latest Browse all 7673

Trending Articles