Results 71 to 74 of 74
Thread: Windows 7
-
10-28-2009 #71Originally Posted by luvsthetrannys
But things are different with newer versions of Windows. Windows 2000 and XP passwords can now be up to 127 characters in length and so 14 characters is no longer a limit. Furthermore, one little known fact discovered by Urity of SecurityFriday.com is that if a password is fifteen characters or longer, Windows does not even store the LanMan hash correctly. This actually protects you from brute-force attacks against the weak algorithm used in those hashes. If your password is 15 characters or longer, Windows stores the constant AAD3B435B51404EEAAD3B435B51404EE as your LM hash, which is equivalent to a null password. And since your password is obviously not null, attempts to crack that hash will fail.
"Do you remember V. P. Dick Cheney "
'YES, I DO. I use to call him 'TAINT'.
"Taint? Why did you call him that?"
'Because in every picture he was between Bush and Colin'
-
10-28-2009 #72
- Join Date
- Oct 2009
- Location
- Sector 001
- Posts
- 6
Originally Posted by scubaman
-
10-28-2009 #73Originally Posted by luvsthetrannys
If your password is 15 characters or longer, Windows stores the constant AAD3B435B51404EEAAD3B435B51404EE as your LM hash, which is equivalent to a null password. And since your password is obviously not null, attempts to crack that hash will fail.
"Do you remember V. P. Dick Cheney "
'YES, I DO. I use to call him 'TAINT'.
"Taint? Why did you call him that?"
'Because in every picture he was between Bush and Colin'
-
10-28-2009 #74
- Join Date
- Oct 2009
- Location
- Sector 001
- Posts
- 6
Originally Posted by scubaman
the security and cryptography lab @ EPFL in Switzerland even had a site up in 2003 showing they could crack any alpha-numeric combination up to 127 characters in an average time of 13 seconds if you cut+paste in the hash values. since there's only so many symbols that can be used I'm sure there's a ton of available hash tables over the years for those too. obsolete indeed