Hi
Quick reply I'm afraid end of the day and a beer is calling
it's due to the lanman hash which splits the NT password into 2 x 7 letters
therefore you can pick up the tail end.  For cracking it's a big problem
because as you noticed it gives you the last few letters possibly giving too
many clues as to what the first 7 letters will be

If you aren't using 95 machines and I think it also applies to 98 you can
turn it off with a registry setting.

hope this helps, the above info is off the top of my head but I'm 90% sure
it's correct

take care
-andy
Taliskers Network Security Tools
http://www.networkintrusion.co.uk
----- Original Message -----
From: "netsec novice" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Wednesday, September 25, 2002 11:12 PM
Subject: password cracking


> I recently began using Lopht to do password cracking on our own network in
> order to enforce our password standards.  In watching the process, I now
> have questions regarding how the cracking works.  I understand basic
> dictionary and even brute force methods.  What I'm confused about is how
> Lopht can determine individual characters without cracking the entire
> password.
> IE.  ?????9pass
> I should mention that this is auditing an NT system. My best analogy is a
> wall safe vs. a key? I would think that the only way the password could be
> cracked would be to input the entire string(key) and see if it opened the
> door.  It appears though that it is treating the password as individual
> characters and cracking one at a time like a combination lock.  Can
someone
> help me clear my fog on this issue?
>
> Thanks in advance...
>
>
> _________________________________________________________________
> Join the world's largest e-mail service with MSN Hotmail.
> http://www.hotmail.com
>

Reply via email to