[debian-edu-commits] [Debian Wiki] Update of "DebianEdu/HowTo/RecoverPasswords" by Martin Schulte

Debian Wiki debian-www at lists.debian.org
Tue Mar 26 21:13:04 UTC 2013


Dear Wiki user,

You have subscribed to a wiki page or wiki category on "Debian Wiki" for change notification.

The "DebianEdu/HowTo/RecoverPasswords" page has been changed by Martin Schulte:
http://wiki.debian.org/DebianEdu/HowTo/RecoverPasswords?action=diff&rev1=1&rev2=2

Comment:
attachment

  The LM hash method only uses the first 14 character of the password. If there are longer passwords you can try [[#manualOptions|this]].
  
  == ophcrack ==
- 
+ {{http://ophcrack.sourceforge.net/logo.png|ophcrack|align="left"}}
  There is a nice open-source tool called [[http://ophcrack.sourceforge.net/|ophcrack]]. It handles the described steps. It uses the mentioned databases (called [[WikiPedia:Rainbow_tables|Rainbow Tables]]). This can be downloaded from the homepage.
  
  To use ophcrack, install the package `ophcrack` (it depends on ''Qt'', so you should do it on an workstation with a desktop environment). Then you have to download the appropriate ''Rainbow Tables'' from http://ophcrack.sourceforge.net/tables.php. I used ''XP free fast'' and ''XP special'' (the Vista tables are only necessary, if you only have the NT-hash). 
@@ -40, +40 @@

  This will generate a file `pwdump.txt` in the same directory as the script. This file contains the usernames and the corresponding LM- and NT hashes in [[WikiPedia:Pwdump|pwdump]]-Syntax.
  
  = Running ophcrack =
+ {{attachment:ophcrack.png|ophcrack|align="right"}} 
  Open ''ophcrack'' and choose the button ''Load'' and then ''PWDUMP file'' and choose the file `pwdump.txt` generated by the script. Now you see all users an the hashes. Hit the button ''Crack'', now ophcrack tries to find the clear text passwords from his database. This can take a little (approx 30-60min for 1000 users). 
  
  Keep in mind, that ophcrack can't handle filenames and paths with special characters (like ä, æ, ß).
@@ -75, +76 @@

  
  There are some online tools like http://www.md5decrypter.co.uk/ntlm-decrypt.aspx and http://crackstation.net/ which can crack hashes for 16 characters long passwords.
  
+ = Attachment =
+ [[attachment:recoverPasswords.pl]]
+ 



More information about the debian-edu-commits mailing list