The result is: Using default input encoding: UTF-8 John ~/Desktop/samhash.txt -format=nt -user=IEUser When I run it in Brute force mode using the following: cd /usr/share/john When I run JtR in Wordlist mode, it cracks the password easily off the word list ('1234'). The default system admin 'IEUser' should at least work, right? It's only showing some of the users, but not any that I created for testing.that's another issue by itself. I mounted the windows' hard drive in Kali, ran PWDUMP7 and got the hashes saved on the desktop. I'm pentesting for a class in Kali Linux, cracking a Windows 7 password.
0 Comments
Leave a Reply. |