John will actually do it for you if you just rerun it like so:
john --show PWDUMPLIST.txt | awk -F ':' '{print $2}' | john --stdin
--format=NT PWDUMPLIST.txt
--
Rob Fuller | Mubix
Certified Checkbox Unchecker
Room362.com | Hak5.org
On Wed, Sep 29, 2010 at 8:57 PM, Robert Portvliet <
[email protected]> wrote:
>
> http://www.xmcopartners.com/lm2ntcrack/index.html
>
>
> On Wed, Sep 29, 2010 at 4:46 PM, Craig Freyman <[email protected]>wrote:
>
>> Hoping someone can give me some direction with John the Ripper. I have a
>> cracked LM Hash and the uncracked NTLM hash. Knowing all the letters and the
>> charset should make it easy to have it spit out the cracked NTLM password in
>> JTR but I cant figure out how to do this. Anyone know?
>> _______________________________________________
>> Pauldotcom mailing list
>> [email protected]
>> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
>> Main Web Site: http://pauldotcom.com
>>
>
>
>
>
> _______________________________________________
> Pauldotcom mailing list
> [email protected]
> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
> Main Web Site: http://pauldotcom.com
>
_______________________________________________
Pauldotcom mailing list
[email protected]
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
Main Web Site: http://pauldotcom.com