Reader small image

You're reading from  Password Cracking with Kali Linux

Product typeBook
Published inFeb 2024
PublisherPackt
ISBN-139781835888544
Edition1st Edition
Right arrow
Author (1)
Daniel W. Dieterle
Daniel W. Dieterle
author image
Daniel W. Dieterle

Daniel W. Dieterle, with over 20 years in IT, has evolved from a system and network support role to a dedicated Computer Security Researcher and Author. His expertise, honed in diverse environments like corporate data centers and Ivy League schools, is reflected in his Kali Linux-based books, widely used globally for security training in universities, government, and private sectors. He has contributed to numerous technical books, articles, and security training classes, and is passionate about mentoring newcomers in the field.
Read more about Daniel W. Dieterle

Right arrow
Not sure what Kind of Hash you have?
There are several different types of hashes that you will run into when you start cracking passwords. We covered Kerberos tickets in depth in the first chapter. But some of the most confusing ones are the different Windows hashes. Let’s try to explain these really quick.
      LM Hash – Outdated password hash that goes back to the old Lan Manager days. LM hashes are no longer stored by default, but you might still find them creeping about.
      NTLM Hash – Comprised of the LM hash and NT Hash (NTHash), separated by a colon. This is what you will find when you dump passwords from a Windows SAM Database or a Domain Controller’s database. NTLM Hashes can be passed in “Pass the Hash” type attacks.
      NTLMv1 or NTLMv2 – These are challenge response hashes, NTLMv2 is more secure. You will capture these hashes...
lock icon
The rest of the page is locked
Previous PageNext Page
You have been reading a chapter from
Password Cracking with Kali Linux
Published in: Feb 2024Publisher: PacktISBN-13: 9781835888544

Author (1)

author image
Daniel W. Dieterle

Daniel W. Dieterle, with over 20 years in IT, has evolved from a system and network support role to a dedicated Computer Security Researcher and Author. His expertise, honed in diverse environments like corporate data centers and Ivy League schools, is reflected in his Kali Linux-based books, widely used globally for security training in universities, government, and private sectors. He has contributed to numerous technical books, articles, and security training classes, and is passionate about mentoring newcomers in the field.
Read more about Daniel W. Dieterle