Hello everyone!
Could you please help me to crack MSchapv2 captured using hostapd-wpe ?
#Test hash#
mschapv2: Tue Nov 21 14:48:49 2017
username: marcelo
challenge: a1:47:b6:b5:6a:44:9a:cb
response: aa:32:4b:a7:e0:ce:25:d9:79:6d:a1:d9:6a:f5:80:14:e1:e7:9f:01:6f:3c:02:8f
jtr NETNTLM: marcelo:$NETNTLM$a147b6b56a449acb$aa324ba7e0ce25d9796da1d96af58014e1e79f016f3c028f mschapv2: Tue Nov 21 14:49:16 2017
Hi guys does anyone know how to crack mschapv2? I've tried using -m 5500, but my hash (string) is not compatible, it seems I'm missing a 3rd part of it. I basically have challenge and response.
The closest I got was to this threat https://hashcat.net/forum/archive/index....-2563.html, but still did not find how to convert my hash to hash cat format.
They say execute the command below, but where should I pass my string (challenge and response)?
perl -ne '/(.*?):\$.*?\$(.*?)\$(.*)/; print "$1::::$3:$2\n";'
Thanks everyone.
Could you please help me to crack MSchapv2 captured using hostapd-wpe ?
#Test hash#
mschapv2: Tue Nov 21 14:48:49 2017
username: marcelo
challenge: a1:47:b6:b5:6a:44:9a:cb
response: aa:32:4b:a7:e0:ce:25:d9:79:6d:a1:d9:6a:f5:80:14:e1:e7:9f:01:6f:3c:02:8f
jtr NETNTLM: marcelo:$NETNTLM$a147b6b56a449acb$aa324ba7e0ce25d9796da1d96af58014e1e79f016f3c028f mschapv2: Tue Nov 21 14:49:16 2017
Hi guys does anyone know how to crack mschapv2? I've tried using -m 5500, but my hash (string) is not compatible, it seems I'm missing a 3rd part of it. I basically have challenge and response.
The closest I got was to this threat https://hashcat.net/forum/archive/index....-2563.html, but still did not find how to convert my hash to hash cat format.
They say execute the command below, but where should I pass my string (challenge and response)?
perl -ne '/(.*?):\$.*?\$(.*?)\$(.*)/; print "$1::::$3:$2\n";'
Thanks everyone.