https://github.com/netspi/ps_multicrack
A powershell script for cracking halfLMchall password hashes
https://github.com/netspi/ps_multicrack
Last synced: 11 months ago
JSON representation
A powershell script for cracking halfLMchall password hashes
- Host: GitHub
- URL: https://github.com/netspi/ps_multicrack
- Owner: NetSPI
- Created: 2012-11-05T16:31:52.000Z (over 13 years ago)
- Default Branch: master
- Last Pushed: 2013-02-05T17:52:28.000Z (about 13 years ago)
- Last Synced: 2025-04-04T12:04:30.520Z (12 months ago)
- Language: PowerShell
- Size: 137 KB
- Stars: 22
- Watchers: 58
- Forks: 9
- Open Issues: 0
-
Metadata Files:
- Readme: README.txt
Awesome Lists containing this project
README
READ ME
----------------------------------------------------------------------------------
You need to specify your rcrack, john, and rainbow table directories in the script
----------------------------------------------------------------------------------
Usage: PS_MultiCrack.ps1 INPUT_FILE OUTPUT_FILE
or
Usage: PS_MultiCrack.sh INPUT_FILE OUTPUT_FILE
Hashes in the input file need to be in either format:
Domain\User:::LMHASH:NTLMHASH:1122334455667788
User::Domain:LMHASH:NTLMHASH:1122334455667788
The output file writes to the directory that you run this script from.
Latest Updates: (as of 01/09/2013)
-Additional support for linux now
-Same functionality, just now it's written in bash
-No need for a functional netntlm.pl
-I found people had issues getting it to work,
so I rewrote it in this script
-Much cleaner output to the powershell window
-I nulled the output for rcrack, so it looks better
-Hashes can be either format listed above
If you find any issues in either script, please let me know.