Mini-Password Cracking Challenge for LOLBitCoin Party | 2013-08-12 12:12 |
As a favor to @Druidian,
I supplied a mini password cracking challenge for hackers at DEFCON. It
was a small list of NTLM hashes that the teams had to crack. They had no
idea what the significance of them was.
I supplied the following NTLM hashes:
l a w l . b i t c o i n @ g m a i l . c o m
So:
lawl.bitcoin@gmail.com
This was the email address the teams had to email in order to get to "Stage 3" of the challenge.
I supplied the following NTLM hashes:
2a89df716d7c39b6038c43546bbc5041 581d884bea2b273e04679e117c085386 42e82d52fa7db0d949fcf66a087579c9 870939d15a53df37156bb07a47a26beb 7660d04a2b64e747eccec3af91fe9c02 f3fa98903f1748acc13185842febfb11 f3f0db2300cadc5d2e49bfb04e1e5e48 225fcf805ccc210c7980b3177740b956 28e1f23668a254bd199526a2093cb364 e3f47723b9640445c6de1c15dcfa7dd5 8c6238b01d465f3a83c3547738f17e7c c602232b6ef5815ec123d64c6b9e2338 dafd403f1c792f9683aa0d669688ffad a461f40632c7facc5bbd401d05cd0b18 2bcf145f94af0416549a7691097fb8df 21d1ab95086551fd50f5d4166e384c2e 75058752b1d8fe1c3743c03efb526c64 45d52779d7239813c4a31f50310f20b1 1389246954dfc619f0008d97f4cb372a 0eaa056eae94da444e42bae1d085e27d 6cb96c5c3db703a219a25f97baa44c9e f59e4b69c6c0e49a12e11f635a925f93These hashes cracked to the values:
larson123 araFAT! will3w0nka l00z3er .,m.,m! boomb00m id10tid10t tr4sht4lk c00lm0d3 oinkoinkping inoutinout n00bzRus @DEFCON g0g0gadget myusername allmycircuits inthebathroom l00km0m! .dotdotdot callmeMAYBE ohtheplaces myAdidasThis doesn't look at the important, until you look at the first character of each password (assuming you kept them in the correct order).
l a w l . b i t c o i n @ g m a i l . c o m
So:
lawl.bitcoin@gmail.com
This was the email address the teams had to email in order to get to "Stage 3" of the challenge.
0 comments | Posted by Rick at: 12:12 permalink |
Comments are closed for this story.