OphCrack-Cli

Description

ophcrack-cli uses Rainbow Tables to crack NTLM and LM hashes into plain text, its a free Windows password cracker based on rainbow tables. It is a very efficient implementation of rainbow tables done by the inventors of the method. If you have a complex password it will take a lot longer than simple passwords.

Usage

Syntax

ophcrack [OPTIONS]

Options

  -a              disable audit mode (default)
  -A              enable audit mode
  -b              disable bruteforce
  -B              enable bruteforce (default)
  -c config_file  specify the config file to use
  -D              display (lots of!) debugging information
  -d dir          specify tables base directory
  -e              do not display empty passwords
  -f file         load hashes from the specified file (pwdump or session)
  -g              disable GUI
  -h              display this information
  -i              hide usernames
  -I              show usernames (default)
  -l file         log all output to the specified file
  -n num          specify the number of threads to use
  -o file         write cracking output to file in pwdump format
  -p num          preload (0 none, 1 index, 2 index+end, 3 all default)
  -q              quiet mode
  -r              launch the cracking when ophcrack starts (GUI only)
  -s              disable session auto-saving
  -S session_file specify the file to use to automatically save the progress of the search
  -u              display statistics when cracking ends
  -t table1[,a[,b,...]][:table2[,a[,b,...]]]
                  specify which table to use in the directory given by -d
  -v              verbose
  -w dir          load hashes from encrypted SAM file in directory dir
  -x file         export data in CSV format to file

Example

cyborg@cyborg:~$ sudo ophcrack-cli -d Downloads/vista\ free/  -e  -w /media/win/Windows/System32/config/
3 hashes have been found in the encrypted SAM found in /media/win/Windows/System32/config/.

Opened 3 table(s) from /home/cyborg/Downloads/vista free,0,1,2.
0h  0m  0s; Found password  for user *disabled* Guest (NT hash #1)
0h  0m  0s; Found password  for user ztrela1 (NT hash #2)
0h  0m  0s; brute force (0%); search (0%); tables: total 3, done 3, using 0; pwd
0h  0m  1s; brute force (6%); search (0%); tables: total 3, done 3, using 0; pwd
0h  0m  2s; brute force (11%); search (0%); tables: total 3, done 3, using 0; pw
0h  0m  3s; brute force (16%); search (0%); tables: total 3, done 3, using 0; pw
0h  0m  4s; brute force (22%); search (0%); tables: total 3, done 3, using 0; pw
0h  0m  5s; Found password mice for user *disabled* Administrator (NT hash #0)
0h  0m  5s; search (100%); tables: total 3, done 3, using 0; pwd found 3/3.

Results:

username / hash                  LM password    NT password
*disabled* Administrator         *** empty ***  mice
*disabled* Guest                 *** empty ***  *** empty ***
ztrela1                          *** empty ***  *** empty ***
0 Comments

Leave a reply

CONTACT US

We're are building as a community and a team. Be a part of it.

Sending

©2017 Ztrela Knowledge Solutions Pvt. Ltd

Log in with your credentials

Forgot your details?