[BBLISA] Breaking Windows XP user password?
Edward Ned Harvey
bblisa2 at nedharvey.com
Sat Jan 26 09:34:32 EST 2008
Not sure what Win XP uses, but some password algorithms are nonreversible
anyway. I saw a youtube video (which I can't seem to find now) where these
guys were cracking old NT passwords, and using the old algorithms it would
take 4 days to crack generally. They said the newer algorithms would take
several months to brute force, but now the algorithms are even stronger than
that.
I know by default all the algorithms in Win 2003 Server R2 are
non-reversible and if you need a reversible algorithm, you have to go
manually override the policy.
> -----Original Message-----
> From: bblisa-bounces at bblisa.org [mailto:bblisa-bounces at bblisa.org] On
> Behalf Of Daniel Hagerty
> Sent: Thursday, January 24, 2008 9:38 PM
> To: Scott Ehrlich
> Cc: bblisa at bblisa.org
> Subject: Re: [BBLISA] Breaking Windows XP user password?
>
> l0phtcrack used to be the canonical thing for this oh so many
> years ago, but there's probably something better now. Knowing this
> magic word is probably enough to lead you to more modern successors.
>
> If the password chosen was reasonably strong, you will be waiting
> a very long time. Unless you have many years to waste waiting, be
> willing to consider options like Dean offered.
>
> _______________________________________________
> bblisa mailing list
> bblisa at bblisa.org
> http://www.bblisa.org/mailman/listinfo/bblisa
More information about the bblisa
mailing list