Quantcast
Channel: hashcat Forum - All Forums
Viewing all articles
Browse latest Browse all 7673

PLEASE, NEED HELP ASAP: secretsdump.py hashes 33 characters long

$
0
0
I've pulled ntds.dit and the system hive from a Win2008r2 domain controller and I'm trying to dump the hashes and crack them with hashcat.

The output from secretsdump is showing 33 character long lmhash and nthash. Why would this be? 

From what I've been reading I should be getting ms cache2 out of secretsdump. I've reformatted the output to look like -m 2100 with DCC2, 10240, username (with and without domain name), and nthash. Is that right?


Thank you everyone!!

Viewing all articles
Browse latest Browse all 7673

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>