[ Date Index ] [ Thread Index ] [ <= Previous by date / thread ] [ Next by date / thread => ]
Seen this way of cracking as I like to brush up on my security. I think (NT)LM is laughable and they should migrate to one of the standards Linux/PAM/GNU/shadow uses, or even a better alternative, like SHA512. On 12 March 2010 20:41, Gordon Henderson <gordon+dcglug@xxxxxxxxxx> wrote: > > http://www.theregister.co.uk/2010/03/12/password_cracking_on_crack/ > > So basically if you have a windows machine with a password of under 14 > characters then it can be decoded in a matter of seconds. > > I tried it with a samba server - set a password of fairly random characters > - entered the hash into the web site referenced in that register article: > > https://www.objectif-securite.ch/en/products.php#demo > > and it gave me the password in about 2 seconds flat. > > So that about wraps it up for windows passwords. > > Gordon > > -- > The Mailing List for the Devon & Cornwall LUG > http://mailman.dclug.org.uk/listinfo/list > FAQ: http://www.dcglug.org.uk/linux_adm/list-faq.html > -- Dan Dart _____ Need a website? Want some music tailored to you? Visit http://www.dandart.co.uk -- The Mailing List for the Devon & Cornwall LUG http://mailman.dclug.org.uk/listinfo/list FAQ: http://www.dcglug.org.uk/linux_adm/list-faq.html