@troyhunt What NTLM hash implementation did you use to produce the NTLM hashes at https://haveibeenpwned.com/Passwords ? There are implementation-specific subtleties, which I'd like to match when using these hashes. Also, did you assume plaintexts were UTF-8 or ISO-8859-1 or otherwise? Thanks!
-
-
9f1c359ed3baf5dd499599eacb29cfeb:$HEX[c390c2bfc390c2b0c391e282acc390c2bec390c2bbc391c592] Looks like UTF-8 got interpreted as CP-1252 Try: echo -n пароль | iconv -f cp1252
-
Same as yours: $ echo -n пароль | iconv -f cp1252 | xxd -p c390c2bfc390c2b0c391e282acc390c2bec390c2bbc391c592 but different NTLM for me: $ echo -n пароль | iconv -f cp1252 | LC_CTYPE=C sed -r 's/(.)/\1\x0/g' | openssl md4 (stdin)= 52bfd207a7fe314ee4f372cdde501d96 Any ideas?
- Još 14 drugih odgovora
Novi razgovor -
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.