Brute Force Password to long

Viewing 9 reply threads
  • Author
    Posts
    • #3765
      impelse
      Participant

      I am running Cain and I got kerberos5 PreAuth Hash when I was sniffing the network, so I am doing a Brute-Force Attack, I set the password length from 6 to 8 lower letters and numbers and take so looooong, that I run it for about 2 1/2 week, I did a test with one password 4 letters and I put the only letters in that password and that was fast, but that is not the normal scenario (in this case I know the passord).

      Do you know another tool to Brute Force password a little fast?

    • #24053
      TTewell
      Participant

      why don’t you download some rainbow tables?

    • #24054
      BillV
      Participant

      8 characters, lowercase only, plus numbers @ 500K pass/sec = 66 days

      http://www.lastbit.com/pswcalc.asp

    • #24055
      impelse
      Participant

      Interesting site.

      What is rainbow tables?

    • #24056
      timmedin
      Participant

      Rainbow tables are precomputed hashes so all you have to do to determine the password is do a lookup. The trade off is lots of storage vs. lots of time. You can find some details on wikipedia.
      http://en.wikipedia.org/wiki/Rainbow_table

      As an asside, here is how keberos authentication works in a nice little picture

    • #24057
      impelse
      Participant

      Thanks.

    • #24058
      Don Donzal
      Keymaster

      Try this article by our very own Chris ates:

      Tutorial: Rainbow Tables and RainbowCrack

      Don

    • #24059
      impelse
      Participant

      Ok, I was checking the rainbow tables and the rcrack tool (incluring the tutorial of this site), but when I sniff using Cain I got Kerb5 PreAuth Hashes.

      Not LM or NTLM or MD5.

      So what do you recommend me?

    • #24060
      TTewell
      Participant

      How much time do you have on your hands?  lol  I can’t think of some place off hand that has a Kerberos rainbow table available for download and the table would probably be MASSIVE because kerberos hashes are more complex.  Perhaps a dictionary attack would be quicker?

    • #24061
      timmedin
      Participant

      Keberos isn’t a big deal. The encrypted piece send from the KDC is encrypted with your password hash. All you have to do is have a large list of hashes.

Viewing 9 reply threads
  • You must be logged in to reply to this topic.

Copyright ©2020 Caendra, Inc.

Contact Us

Thoughts, suggestions, issues? Send us an email, and we'll get back to you.

Sending

Sign in with Caendra

Forgot password?Sign up

Forgot your details?