Not sure what Win XP uses, but some password algorithms are nonreversible
anyway.  I saw a youtube video (which I can't seem to find now) where these
guys were cracking old NT passwords, and using the old algorithms it would
take 4 days to crack generally.  They said the newer algorithms would take
several months to brute force, but now the algorithms are even stronger than
that.  

I know by default all the algorithms in Win 2003 Server R2 are
non-reversible and if you need a reversible algorithm, you have to go
manually override the policy.



> -----Original Message-----
> From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On
> Behalf Of Daniel Hagerty
> Sent: Thursday, January 24, 2008 9:38 PM
> To: Scott Ehrlich
> Cc: [email protected]
> Subject: Re: [BBLISA] Breaking Windows XP user password?
> 
>     l0phtcrack used to be the canonical thing for this oh so many
> years ago, but there's probably something better now.  Knowing this
> magic word is probably enough to lead you to more modern successors.
> 
>     If the password chosen was reasonably strong, you will be waiting
> a very long time.  Unless you have many years to waste waiting, be
> willing to consider options like Dean offered.
> 
> _______________________________________________
> bblisa mailing list
> [email protected]
> http://www.bblisa.org/mailman/listinfo/bblisa

_______________________________________________
bblisa mailing list
[email protected]
http://www.bblisa.org/mailman/listinfo/bblisa

Reply via email to