Hey Friends,
so, this isn't a HASHCAT issue even though at first i thought it was - because no LM hash out of the two last NTDS.dit files we opened has cracked.
however, after when we used both DCSync and a GUI software we saw that the SAME password (with the same NTLM hash) had a different LANMAN hash, can anyone explain to me how that happens? and if that makes the LM password Uncrackable?
Hey Friends,
so, this isn't a HASHCAT issue even though at first i thought it was - because no LM hash out of the two last NTDS.dit files we opened has cracked.
however, after when we used both DCSync and a GUI software we saw that the SAME password (with the same NTLM hash) had a different LANMAN hash, can anyone explain to me how that happens? and if that makes the LM password Uncrackable?
https://pasteboard.co/HhLDEMz.png
ty
so, this isn't a HASHCAT issue even though at first i thought it was - because no LM hash out of the two last NTDS.dit files we opened has cracked.
however, after when we used both DCSync and a GUI software we saw that the SAME password (with the same NTLM hash) had a different LANMAN hash, can anyone explain to me how that happens? and if that makes the LM password Uncrackable?
Hey Friends,
so, this isn't a HASHCAT issue even though at first i thought it was - because no LM hash out of the two last NTDS.dit files we opened has cracked.
however, after when we used both DCSync and a GUI software we saw that the SAME password (with the same NTLM hash) had a different LANMAN hash, can anyone explain to me how that happens? and if that makes the LM password Uncrackable?
https://pasteboard.co/HhLDEMz.png
ty