Betr.: PWDUMP Parser

From: Philip Wagenaar (p.wagenaar@accon.nl)
Date: Wed Jul 07 2004 - 03:18:09 EDT


Hi,

I use Cain & Abel (http://www.oxid.it/cain.html) for cracking passwords. This is great tool for checking how secure you are anyways.

>From the Author:

Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols. The program comes in two versions because of the differences and limitations of some API.

Version 2.5 is faster and contains a lot of new features like APR (Arp Poison Routing) which enables sniffing on switched LANs by hijacking IP traffic of multiple hosts at the same time. The sniffer can also analyze encrypted protocols such as SSH-1 and HTTPS if used with APR and a Man-in-the-middle situation. Cain also ships routing protocols authentication monitors and routes extractors, crackers for all common hashing algorithms and for other various specific authentications, password calculators (Cisco PIX Hashes, RSA SecurID Tokens), decoders (Access Databases, Base64, Cisco Type-7, Enterprise Manager, Dialup, Remote Desktop) and some utilities like the Cisco Config Downloader/Uploader, the SiD-Scanner, the LSA Secrets Dumper, the Protected Storage Passwords Viewer, the NT Hash-Dumper (works with Syskey enabled), the Abel Remote Console, the MAC Scanner, the Promiscuous-Mode Scanner, the Wireless Scanner and the TCP/UDP/ICMP Traceroute + DNS Resolver + Netmask Discovery + WHOIS resolver (extract infor
mations from RIPE's Database).
However the program is still in beta and may contain bugs.

Met vriendelijke groet,

Philip Wagenaar
Junior Projectleider ICT

AccoN Accountants & Adviseurs
ICT Project Bureau
Postbus 5090
6802 EB Arnhem
The Netherlands

tel. +31 (0)26-3842384
fax. +31 (0)26-3630222
mobile: +31 (0)6-25388935
MSN/E-mail: p.wagenaar@accon.nl
http://www.accon.nl

>>> Mike Anderson <mike_and@yahoo.com> 06-07-04 18:00 >>>
Already did some googling on this subject to no avail,
so I thought I would start here for an answer.

I have a rather large pwdump file (over 3000 accounts)
that I am working with. I need to extract
approximately 200 user names/hash pairs from it.
Other than using notepad/word to do a find/search then
copy and paste, does anyone know of a "pwdump parser"
that is out there? I envision inputting a user name
(or list of user names) and then having it return the
user name and hash pair in a text file.

Thanks..

=====
Mike Anderson
mike_and@yahoo.com

        
                
__________________________________
Do you Yahoo!?
New and Improved Yahoo! Mail - 100MB free storage!
http://promotions.yahoo.com/new_mail

##################################################################

Dit e-mailbericht is uitsluitend bestemd voor de geadresseerde.
De informatie hierin is vertrouwelijk, zodat het derden niet is
toegestaan om daarvan kennis te nemen of dit te verstrekken aan
andere derden. Indien u dit e-mail bericht ontvangt terwijl het
niet voor u bestemd is, verzoeken wij u contact op te nemen met
de afzender en de informatie te verwijderen van iedere computer.
Bij voorbaat dank.

==================================================================

The information transmitted in this e-mail is intended only for
the person or entity to which it is addressed and contains
confidential information. Any review, retransmission or other
use by persons or entities other than the intended recipient is
prohibited. If you received this in error, please contact the
sender and delete the material from any computer. Thank you.

##################################################################

#####################################################################################
This e-mail message has been scanned for Viruses and Content and cleared
by MailMarshal
#####################################################################################



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:53:57 EDT