https://github.com/gromnitsky/hashcat-ntlm-cyrillic
A Cygwin helper for cracking NTLM passwords w/ hashcat
https://github.com/gromnitsky/hashcat-ntlm-cyrillic
Last synced: 7 months ago
JSON representation
A Cygwin helper for cracking NTLM passwords w/ hashcat
- Host: GitHub
- URL: https://github.com/gromnitsky/hashcat-ntlm-cyrillic
- Owner: gromnitsky
- Created: 2019-06-15T11:08:15.000Z (over 6 years ago)
- Default Branch: master
- Last Pushed: 2019-06-15T11:09:12.000Z (over 6 years ago)
- Last Synced: 2025-01-20T06:42:15.735Z (9 months ago)
- Language: Shell
- Size: 3.91 KB
- Stars: 2
- Watchers: 2
- Forks: 2
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# hashcat-ntlm-cyrillic
A Cygwin helper for cracking NTLM passwords w/ hashcat.
## Why?
NTLM is `md4(utf16le(password))`. To crack it, you need to provide a
custom charset, converted to utf16le & presented in hex. This script
does the proper conversions automatically.## Setup
~~~
$ git clone ...
$ cd hashcat-ntlm-cyrillic
$ wget https://hashcat.net/files/hashcat-5.1.0.7z
$ 7z x hashcat-5.1.0.7z
$ cd hashcat-5.1.0
~~~winpty in PATH is advisable.
## Usage
Generate a hash for testing:
~~~
$ ../ntlm.sh hash кєк
af5fd3f79b88e5dca1a95238aa429e43
~~~Crack it:
../ntlm.sh crack йцукенгшщзє af5fd3f79b88e5dca1a95238aa429e43
or
../ntlm.sh -l3 crack йцукенгшщзє af5fd3f79b88e5dca1a95238aa429e43
(You may pass any options to hashcat (like -d) *after* the hash
parameter.)where -l3 is the length of a password, йцукенгшщзє is our charset. You
may provide file names instead of the charset & the hash. If you
provide a file name in place of the charset, its content must be
encoded as:~~~
$ ../ntlm.sh mkcharset йцукенгшщзє
04333537393a3d4346484954
~~~View the result:
~~~
$ ../ntlm.sh show af5fd3f79b88e5dca1a95238aa429e43
af5fd3f79b88e5dca1a95238aa429e43:кєк
~~~## License
MIT