I have used orphcrack, not too much with vista but with the 120GB of full data hak5 rainbow tables on torrent i should be able to crack any of them right? will LM also crack MD5 and SHA1 as well? Does Hak5 offer rainbow tables for md5 and sha-1? I did not know orphcrack only bruted up to 4 chars that is good to know, do LM tables even work with vista and 7?
This howto assumes you have already installed ophcrack 3 and downloaded the ophcrack rainbow tables you want to use. It also assumes that you understand how to use third party tools like pwdump or fgdump to dump the SAM of a Windows system.
Ophcrack rainbow tables are avaible at ophcrack rainbow tables page. The XP free small, XP free fast and Vista free rainbow tables are free. The others ophcrack rainbow tables are sold by Objectif Securite.
If you want to crack LM hashes as found on Windows XP by default (the LM Hash column is never empty on the ophcrack main window), first install and enable either the XP free small (if you have less than 512MB of free RAM) or the XP free fast (if you have more than 512MB of free RAM). Do NOT enable both of them since this is generally useless and will slow down the cracking process. Then install and enable the Vista free tables set. Finally install and enable the other XP rainbow tables you may have (XP special, XP german) and Vista one (Vista special). Sort the rainbow tables with the up and down arrows the following way : first the XP free then the Vista free then the XP special after that the Vista special and finally the XP german.
If you want to crack NT hashes as found on Windows Vista by default (the LM Hash column is always empty on the ophcrack main window), first install and enable the Vista free tables set. Then install and enable the Vista special tables set. Disable every other XP tables sets since they are useless and slow down the cracking process. Sort the enabled rainbow tables with the up and down arrows the following way : first the Vista free then the Vista special.
Operating systems from Windows Vista onward use NThash tables for encrypting passwords. Ophcrack has rainbow tables for NThash, which range from a 450MB dictionary-based table to a colossal 2TB table that includes all alphanumeric symbols in mixed case and all special characters.
I am new to hacking. I got the SAM and SYSTEM file from a virtual machine image, then I ran samdump2. I saved this to a .txt file, I loaded the downloaded vista rainbow tables on ophcrack, and then I loaded the .txt file with the users and NT hash. Before I even press crack, it states that 1/1 passwords have been found and the NT pwd is empty. Can someone explain to me how this is possible and what I am doing wrong? I already know the password, and the password is most definitely present on the user account in question.
The ophcrack vista liveCD is an example. In contains two dictionaries and tries combinations of words as well as modifications. For example the main dictionary contains "house" and "boat" and the second dictionary has "2010" "2011" "january". It will then create passwords like boat2010 or BOAT2010 or h0us3january.
aa06259810