Reverseing NTLMv1 using GPUs and cracking Passw0rds

Presented at THOTCON 0x9 (2018), May 5, 2018, 2 p.m. (25 minutes)

Last year we built a password cracking rig for our team, and did some fun demos at BlackHat, SecTor, and several events and conferences. Having access to hardware, we have also had some time to do research. Do people still use bad passwords? Of course. But now we have some evidence behind it, and want to present our research, and things that we have found in the last year. Including how we are reversing NTLMv1 challenge hashes to NTLM hashes in under 12 hours.


Presenters:

  • Dustin Heywood / EvilMog as Dustin Heywood (evilmog)
    David Bryan (@_VideoMan_) and Dustin Heywood (@evil_mog) are pentesters and crack passwords with GPUs. #hashcat #123456
  • David Bryan / VideoMan as David Bryan (VideoMan)
    David Bryan (@_VideoMan_) and Dustin Heywood (@evil_mog) are pentesters and crack passwords with GPUs. #hashcat #123456

Similar Presentations: