Author Topic: BruteForcing DC with HashCat  (Read 2024 times)

xelvet

  • Newbie
  • *
  • Posts: 6
BruteForcing DC with HashCat
« on: November 03, 2016, 07:13:39 pm »
How to extract the necessary .bin data and
feed it into hashCat, for cracking, please advise @ntldr.

Выкурил здесь железо кот террористы узурпировавшие эту власть
отобрали у меня 4.5 года назад. Рыскали по всем моим жёстким aka
digital forensic, poor devils. Now i'm doing my forensic on their forensic.

Now it seems one of my hdds is encrypted with DiskCryptor.
Naturally i can't remember( the passphrase, it's been quite awhile.

Also, https://letsencrypt.org/
« Last Edit: November 04, 2016, 03:24:07 am by xelvet »

Anfinuo

  • Sr. Member
  • ****
  • Posts: 380
Re: BruteForcing DC with HashCat
« Reply #1 on: November 04, 2016, 12:00:55 pm »

xelvet

  • Newbie
  • *
  • Posts: 6
Re: BruteForcing DC with HashCat
« Reply #2 on: November 05, 2016, 08:24:36 pm »
:D
wtf? it's essential.  pen testing. how else
on earth can you be sure of something
if you've never pentested it yourself?