RE: Rainbow Tables

From: ROB DIXON (rdixon@workforcewv.org)
Date: Wed Feb 08 2006 - 08:43:27 EST


Maybe I should rephrase that. NOT "as" likely to use. Yes we all have cracked versions of something, but my point is that Tony is trying to convince "others" at work to use the free stuff. Why would you go and purchase commercial tables that you can make yourself for free and you can customize them to fit your needs? From my own experience I have seen more free stuff than I have commercial (not limited to password cracking). Technically you dont need anything but the rainbowtable tools to do the entire password list audit. It is I assume his work network, so it will be easy to get all password lists remotely. He could even use login scripts to gather local password lists remotely.

Maybe I got a little off track. I apologize.

Robert L. Dixon, CSO
CHFI A+
State of West Virginia's
West VIriginia Office of Techonology
Infrastructure Applications
Netware/GroupWise Administrator
Telephone: (304)-558-5472 ex.4225
Email:rdixon@workforcewv.org
>>> "Craig Wright" <cwright@bdosyd.com.au> >>>

Please explain 'WHY' a "malicious attacker" is NOT likely to use
commercial products.

In the real world attackers use "commercial products" all the time -
from script kiddies up. There are numerous Warez and Crack sites
distributing commercial software. There is a clear distinction from
having to legally obtain software and using a cracked version, but this
has nothing to do with use. If you are breaking the law by scanning, it
is not likely that copyright laws will hinder you.

There are far more LC5 installs than have been sold. Further, the
commercial products are oft easier - thus attracting more people to use
them.

Craig

-----Original Message-----
From: ROB DIXON [mailto:RDIXON@workforcewv.org]
Sent: 8 February 2006 5:04
To: stark192@hotmail.com; pen-test@securityfocus.com
Subject: Re: Rainbow Tables

Hey Tony,

   The "others" should be informed that the malicious attacker is most
likely to NOT use "commercial" products.

And that for a true benchmark, maybe use the products that a malicious
attacker would use. Most of which will probably be open source or free
at the least. That is assuming that they are not writing their own
software. ;) I guess I'm asking, how do you justify "not" using free
products?

You can buy pre-computated rainbow tables, but there are different
rainbowtables for different types of hashes. Example: ntlm, ntlmv2, sha1
, md5, etc.

cheers,

New Guy

Robert L. Dixon, CSO
CHFI A+
State of West Virginia's
West VIriginia Office of Techonology
Infrastructure Applications
Netware/GroupWise Administrator
Telephone: (304)-558-5472 ex.4225
Email:rdixon@workforcewv.org
>>> <stark192@hotmail.com> >>>

Hello,

Trying to crack our password list at work, it's a long story, but it has
been put on a higher priority. I've been looking for some good
pre-computed hash tables, like Rainbow tables, that will work with LC5.
Does anyone have a source?

I'd like to use RainbowCrack but others want to stick to commercial
products.

Thanks,

Tony

------------------------------------------------------------------------
------
Audit your website security with Acunetix Web Vulnerability Scanner:

Hackers are concentrating their efforts on attacking applications on
your website. Up to 75% of cyber attacks are launched on shopping carts,
forms, login pages, dynamic content etc. Firewalls, SSL and locked-down
servers are futile against web application hacking. Check your website
for vulnerabilities to SQL injection, Cross site scripting and other web
attacks before hackers do!
Download Trial at:

http://www.securityfocus.com/sponsor/pen-test_050831
------------------------------------------------------------------------
-------

------------------------------------------------------------------------
------
Audit your website security with Acunetix Web Vulnerability Scanner:

Hackers are concentrating their efforts on attacking applications on
your website. Up to 75% of cyber attacks are launched on shopping carts,
forms, login pages, dynamic content etc. Firewalls, SSL and locked-down
servers are futile against web application hacking. Check your website
for vulnerabilities to SQL injection, Cross site scripting and other web
attacks before hackers do!
Download Trial at:

http://www.securityfocus.com/sponsor/pen-test_050831
------------------------------------------------------------------------
-------

Liability limited by a scheme approved under Professional Standards Legislation in respect of matters arising within those States and Territories of Australia where such legislation exists.

DISCLAIMER
The information contained in this email and any attachments is confidential. If you are not the intended recipient, you must not use or disclose the information. If you have received this email in error, please inform us promptly by reply email or by telephoning +61 2 9286 5555. Please delete the email and destroy any printed copy.

Any views expressed in this message are those of the individual sender. You may not rely on this message as advice unless it has been electronically signed by a Partner of BDO or it is subsequently confirmed by letter or fax signed by a Partner of BDO.

BDO accepts no liability for any damage caused by this email or its attachments due to viruses, interference, interception, corruption or unauthorised access.

------------------------------------------------------------------------------
Audit your website security with Acunetix Web Vulnerability Scanner:

Hackers are concentrating their efforts on attacking applications on your
website. Up to 75% of cyber attacks are launched on shopping carts, forms,
login pages, dynamic content etc. Firewalls, SSL and locked-down servers are
futile against web application hacking. Check your website for vulnerabilities
to SQL injection, Cross site scripting and other web attacks before hackers do!
Download Trial at:

http://www.securityfocus.com/sponsor/pen-test_050831
-------------------------------------------------------------------------------

------------------------------------------------------------------------------
Audit your website security with Acunetix Web Vulnerability Scanner:

Hackers are concentrating their efforts on attacking applications on your
website. Up to 75% of cyber attacks are launched on shopping carts, forms,
login pages, dynamic content etc. Firewalls, SSL and locked-down servers are
futile against web application hacking. Check your website for vulnerabilities
to SQL injection, Cross site scripting and other web attacks before hackers do!
Download Trial at:

http://www.securityfocus.com/sponsor/pen-test_050831
-------------------------------------------------------------------------------



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:55:28 EDT