Not sure what Win XP uses, but some password algorithms are nonreversible anyway. I saw a youtube video (which I can't seem to find now) where these guys were cracking old NT passwords, and using the old algorithms it would take 4 days to crack generally. They said the newer algorithms would take several months to brute force, but now the algorithms are even stronger than that.
I know by default all the algorithms in Win 2003 Server R2 are non-reversible and if you need a reversible algorithm, you have to go manually override the policy. > -----Original Message----- > From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On > Behalf Of Daniel Hagerty > Sent: Thursday, January 24, 2008 9:38 PM > To: Scott Ehrlich > Cc: [email protected] > Subject: Re: [BBLISA] Breaking Windows XP user password? > > l0phtcrack used to be the canonical thing for this oh so many > years ago, but there's probably something better now. Knowing this > magic word is probably enough to lead you to more modern successors. > > If the password chosen was reasonably strong, you will be waiting > a very long time. Unless you have many years to waste waiting, be > willing to consider options like Dean offered. > > _______________________________________________ > bblisa mailing list > [email protected] > http://www.bblisa.org/mailman/listinfo/bblisa _______________________________________________ bblisa mailing list [email protected] http://www.bblisa.org/mailman/listinfo/bblisa
