Letters-Only LM Hash Database 237
Peter Clark writes "Disk storage has increased tremendously in the past 5 years and the blatant insecurities in the antiquated LM hashing technique have not gone away; though functionality has been added to disable LM hashes, this is not set by default. With some help from Elcomsoft, simple flat files have been created that hold every combination of LM hash for letters only passwords. Jesko has coded a server application which allows you to access this database. Simply telnet to: beginningtoseethelight.no-ip.org on port 2501 and paste in a LM hash. So how does this differ from Rainbow tables? Well this will return a password 100% of the time, using minimal processor power, in approximately less than 0.2 seconds."
less than 0.2 seconds (Score:5, Funny)
Someone explain? (Score:5, Insightful)
Re:Someone explain? (Score:5, Informative)
You telnet to it, feed it the hash, and it replies with the word.
LM hashes are how a lot of passwords are 'encrypted'
Excuse the fuzzy description... Crypto is not my strong point.
Re:Someone explain? (Score:4, Informative)
That is untrue. Any hash can be reversed in the sense that you can generate an input that will result in a specific output. However the input may not be the only one generating that output and it may be computationally infeasible to do this for sufficiently random original inputs to the hash. The property of a (theoretical) perfectly secure hash is that you have to try possible inputs and hash them until you are lucky.
In other cases you might actually be able to reverse the algorithm itself and do without trying a lot of inputs. A hash were this is possible with significantly less effort is usually called "broken".
So what someone has done here is pre-hashed an entire dictionary, and created a word=hash lookup system.
Yes, that is called a "Dictionary Attack", and the dictionary is a function reversing the hash and given in the form of a table. Quite an old technique. But since LM hashes are not very secure, the possibility to do this is not surprising to anybody in the field.
That is NOT "reversing a hash" (-1, Misinformed) (Score:5, Informative)
That is untrue. Any hash can be reversed in the sense that you can generate an input that will result in a specific output.
That is NOT reversing the hash: this should be painfully bloody obvious since the process you describe runs the same hash in the same manner.
Reversing a hash - meaning you start w/ the hash and work backwards to recreate the original data - is impossible. Bits are lost during the hash process, and there is no data in the hash that will allow those bits to be reconstructed. Read _Applied_Cryptography_ by Bruce Schneier, or at least read any of the many crypto/hash FAQs available on the web. NIST [nist.gov] has some good papers available.
-1, Misinformative (Score:2)
Re:Someone explain? (Score:5, Informative)
Re:Someone explain? (Score:2)
Funny this is, when I glanced at the title of this page, I read "Letters of mass destruction". Very droll.
Re:Someone explain? (Score:5, Informative)
Re:Someone explain? (Score:5, Funny)
Of course it's not clear, it's been hashed -- haven't you been following along?
Re:Someone explain? (Score:2)
Re:Someone explain? (Score:2)
The hashing algorithm used since NT4SP3 and Win2K is NTLMv2, whereas "lanman" is NTLMv1. NTLMv2 is significantly more secure, however, for backward compatibility with older Windows 9x machines some companies still use NTLMv1.
Re:Someone explain? (Score:5, Informative)
Actually by default all passwords shorter than 14 characters are stored as BOTH LMv2 AND LMv1 hashes in the registry and both are valid for authentication if they are present. This is true for both Windows Server 2000 and Server 2003. You CAN disable the storage of LMv1 hashes but that does not remove any existing hashes from the SAM, you would also need to force LMv2 authentication and even then someone who could steal the SAM file could get the plaintext.
Re:Someone explain? (Score:2)
I think in most cases simply turning off LM authentication altogether is sufficient. Sure, if someone could steal the SAM file, then they would get the existing hashes. However, if an attacker can get this kind of access to your system, then you have bigger problems. With this kind
Re:Someone explain? (Score:2)
Re:Someone explain? (Score:4, Informative)
C:\WINNT\system32\config\SAM for Windows 2000
There are tools out there like PWDUMP from SAMBA that can extract the hash from a SAM file.
Re:Someone explain? (Score:3, Informative)
Basically, you want the security policy "Network security: Do not store LAN Manager hash value on next password change." in Group Policy->Computer Configuration->Windows Settings->Security Settings->Local Policies->Security Options.
Or you can set the registry value the policy sets directly: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Contro l\Lsa\NoLMHash.
Note that on 2000 and earlier, this prevents only the cre
Re:Someone explain? (Score:5, Informative)
In simple terms, a hash is a sort of "one-way" function. Passwords are often saved as hashes. THe password is fed in one end, and the hash comes out the other. The hash is saved in a file. When one logs in and types in one's password, the system feeds what you typed in through the hash function and checks if the result matches the hash of your password. Since there is no way to reverse the hash process, it's been considered fairly safe to leave these hashes moderately unprotected. This database is, presumably, a sorted collection of the possible hashes from all letters-only passwords up to a certain length. The hash can't be reversed to get the password it came from, but a huge database of all possible hashes and their originating passwords certainly makes that irrelevant.
Re:Someone explain? (Score:4, Informative)
Actually, last time I checked, most versions of windows that used LanManager hashes split the password string into a new hash every 7 characters (yes, that is incredibly stupid). In other words, if your password was 8 characters long, there would be two hashes for your password: one that covered the first 7 characters, and one that covered the last 1 character.
So, I would assume the folks here have done every letter combination for up to 7 character long passwords, since that's all they'd need to do.
Re:Someone explain? (Score:2)
So, I would assume the folks here have done every letter combination for up to 7 character long passwords, since that's all they'd need to do.
Yep. The 124 Billion Names of Bill Gates.
Re:Someone explain? (Score:2, Informative)
They're not used much anymore because they're ludicrously insecure yet windows still makes a LM hash of all passwords by default. You can easly get someone's (administrator) password from these hashes, and the hashes aren't hard to get from a computer.
They're not used and can give others your password, and now there's a site that'll give you any letters only password from it's hash in seconds.
Re:Someone explain? (Score:2)
lookup table vs computation (Score:3, Informative)
Instead of using the brute-force computing approach of generating hashes and comparing them to the known hash (looking for a match), this process uses an already created list or table of passwds and their associated hashes. Creating the table is computationally and storage[ally] non-trivial, but once it is in place cracking a passwd is as easy as grep-ing through the list/table to find the known hash.
Nutshell:
cracking passwds individually: no up front work and extremely variable cracking time
crea
Re:Someone explain? (Score:2)
A google for LM comes up with all kinds of things. Logistics Management, Land Mines.
Re:Someone explain? (Score:2, Informative)
There are two things people always forget about LM Hashes:
The LM logon protocol is challenge/response. The server sends a random 8-byte string (the challenge) and both client and server encrypt it. The client sends back the result (the response) and the server checks to see if the responses match. If so, you're in.
Note that the hash is not sent over the wire.
T
of course... (Score:4, Insightful)
Re:of course... (Score:5, Insightful)
Re:of course... (Score:2)
Re:of course... (Score:2)
I thought that was the whole point of this exercise - that a centrally-available hash master was viable.
And just out of curiosity, wouldn't the master file be really compressible?
GTRacer
- My PW's have always included numbers and often punctuation just for this reason
Re:of course... (Score:3, Informative)
Not really -- good hashes act random.
Re:of course... (Score:2)
Re:of course... (Score:2)
Re:of course... (Score:2)
Re:of course... (Score:2)
Say there's 36 valid hash characters, then
36^7 which I calculate as:
78,364,164,096. 78 billion hash combinations.
78.3b * 7 = 548 Billion x 2 for character mapping
= 1.1 TB.
Plus some overhead
You'll be able to fit this on a laptop in 2 years.
Re:of course... (Score:3, Interesting)
But they wouldn't need to. All you need is a telnet client and a network connection. And there is no reason that one couldn't add to the existing files.
In fact, this would be a really cool project to break up into pieces. Bob takes everything starting with A|a, Steve takes B|b, etc... Then just build a front end (accessable via telnet) that passes each query off to each back end and returns the results. You could even hac
Re:of course... (Score:2)
or do it later or whatever.
Re:of course... (Score:2)
Good password design:
1. disable NTLM
2. use 15+ character passwords.
3. dont write you password on a post-it note and attach it to the bottom side of your keyboard
Re:of course... (Score:2)
you need only a bit more than half of it (Score:2, Insightful)
As far as I'ver understood it, every possible 7byte hash exists somewhere.
Therefore you could sort the plaintext which belongs to the hash after the hash's number.
Don't know if I'm unclear, but here is a example using single-digit-decimal numbers up to 4 (two digit binary):
[hash] / [password]
1
Re:of course... (Score:2)
Additionally, it seems like there's a much easier way to do this. If you number the passwords and the hashes in sequence, you should be able to store a simple mapping. If the first password (the single letter a) hashes to the 1,367,429 hash, your first entry would be 1 -> 1367429, which takes considerable less than 14 bytes to store. Converting from the number back to the actual password/hash and vice
Re:of course... (Score:2)
Non sequitur? (Score:3, Insightful)
Maybe I'm being a bit thick here but how does the first part of that sentence relate to the other?
Re:Non sequitur? (Score:2)
Re:Non sequitur? (Score:5, Informative)
- you have a password hash you want to crack
you can either:
- brute force your way through a long list of possible passwords to find one that matches the hash; everytime you do this, it takes a lot of time and processing power
- or you can go through all possible passwords ONCE and save the resulting hashes; subsequent cracking jobs are very fast, but you wasted a lot of space to store all possible hashes.
thus, if disk space is cheap and you can afford to keep a couple of gigs in pre-computed hashes around, you have a very fast way of cracking weak hashes. a couple of years ago, this was not possible due to hard drives being like 200MB large.
Re:Non sequitur? (Score:2)
thus, if disk space is cheap and you can afford to keep a couple of gigs in pre-computed hashes around, you have a very fast way of cracking weak hashes. a couple of years ago, this was not possible due to hard drives being like 200MB large.
You could always burn the data on a DVD rom. That would give you around 7 Gigabytes to
Re:Non sequitur? I think you mean... (Score:2)
I think you mean 200GB.
Clear writing is a lost art... (Score:5, Interesting)
It is well known that the LM (LanManager password) hashing technique used by older Windows OSes (thru WinMe) is insecure. Now someone has really pointed this out by simply saving all possible password hashed in a database made possible with today's cheap, large disk drives...
But that wouldn't be nearly as much fun - by being vague you get many more posts correcting grammar, explaining what should have been there in the first place, etc.
In short, better writing might promote more useful comment posts, and we wouldn't want that on Slashdot.
modeling unknown passwords (Score:5, Interesting)
I think this sort of attack could get much stronger than people expect if there was some sort of Markov-process-ish way of generating plausible passwords. I mean, if Google can guess when you spelled something wrong, these programs should be able to figure out which strings are more likely to be passwords. Or maybe I'm overgeneralizing by how I pick my own passwords....
Re:modeling unknown passwords (Score:3, Insightful)
I see this as mostly just a harbinger of Things To Come. At what point will it become a trivial matter to generate a database of all possible hashes of all possible passwords (incl. all symbols and numbers
Re:modeling unknown passwords (Score:2)
(c:
Re:modeling unknown passwords (Score:2)
Re:modeling unknown passwords (Score:2)
If you want a program that figures out which strings are likely to be passwords, use l0phtcrack which incorporates a dict
One of us is missing something. I think it is you. (Score:2)
The point of the article isn't that "fiqojeio" is better or worse than "foo7bar+". It is that LM hashing method is weak and should not be used.
Re:modeling unknown passwords (Score:3, Funny)
Yes, much less likely, but people sometimes choose things like that for their passwords anyway. My wife's self-chosen password to her bank account, for example, is 'Nfok3G!~qOmp', and I can tell you that NOBODY is going to guess that one!
My passwords (Score:2)
Numbers, upper and lower case letters.
so 62^+62^7+62^8 =2.12x10^14 combinations.
I think I'm okay for a while.
Multicase passwords do HUGE things to the statistics of the problem.
Re:My passwords (Score:5, Informative)
Normally, yes. But the LM method converts everything to uppercase before hashing. So your 8 character password, that had 10^14 combinations has just been reduced down to (26+10)^8... combinations or 2.9*10^12. Now, you might be saying "That was only a factor of four drop, no big deal, still 10^12 combos left. Realize though, that this DB currently has all possible passwords of a maximum length of 15 characters. This is 2.8*10^13 combos. This is less than the 10^12 possibilities that your password has. Consider that it searches in 0.2 seconds, and your password is not so safe.
Re:My passwords (Score:2, Informative)
Re:My passwords (Score:5, Informative)
You're okay for about 2 hours and 34 minutes: that's how long it takes to traverse every possible alphanumeric input on the author's test rig. Additionally, the article suggests that tables including every possible LM hash for [A-Z0-9] would occupy only 1.2 TB of space, meaning that these lookups could be done in a matter of milliseconds instead.
Holy Ratshit, Batman! (Score:3, Funny)
Please, please tell me you are joking.
I am no fan of MicroSoft, but come on, no one would really do something like this.
I figured that my passwords are safe because they are normally the tunes of music..
For example
Taaaah-dum+dum*dum#dum#taaaaah|dum!tum^d u m$tum%rumtittytum.
And since I am tone deaf, It's not very likey that someone will
Re:Holy Ratshit, Batman! (Score:2)
Re:Holy Ratshit, Batman! (Score:5, Interesting)
The fun part is that any default install of Windows (at least up to and including XP) will send out the current users LM hash if he tries to connect to a SMB share.
So, if someone placed a link on their homepage to a patched Samba which logged LM hashes, they could gather LM hashes from most of their windows using visitors.
This would *include* those behind many firewalls, because many default firewall setups will allow *outgoing* connections - and in this particular case, it is indeed the windows client that is initiating the connection to the remote web server in order to send away the current users LM hash (along with username, domain, local machine name and other goodies).
Yes, I told CERT about this some three years ago. They wouldn't touch it with a five foot pole. I then told Microsoft about it. Their response was something like "fixing that problem would require us to re-design our windows networking layer - therefore it is not a security problem".
Well, there you have it.
But hey, if you're on Windows you're fucked anyway, and none of this should really come as a shock to you
Re:Holy Ratshit, Batman! (Score:2)
Re:Holy Ratshit, Batman! (Score:2)
Sure, then you're sort of right I guess
Basically, you're safe because you're one fish in a million. The chance of getting eaten is very small.
Unless you're not just a little fish - if someone keeps a database of LM hashes (and user name, domain, machine name, IP,
Re:Holy Ratshit, Batman! (Score:2)
So, can you post a link explaining how to disable this as part of a non-default install? I'm not sure I've ever seen this before.
Here's how (Score:5, Informative)
See this [microsoft.com] page for this and related policies.
This [microsoft.com] for an overview of LM, NTLM and NTLMv2.
And here [microsoft.com] to see how to prevent storage of LM hashes.
Re:My passwords (Score:3, Interesting)
I tend to use uppercase, lowercase, numbers, and punctuation. An example might look like: s1mhm$tM-BIdc! (just off the top of my head, and memorable to me)
Most people do have horrific password security though...
-- Pete.
This just in from beginningtoseethelight... (Score:5, Funny)
Thank you for letting us know your passwords.
Regards,
The staff of beginningtoseethelight
Light? (Score:2, Funny)
beginningtoseethelight.no-ip.org
the
The light at the end of the tunnel is the headlight of an approaching train.
Am I the only one to see a connection ?
awright! (Score:5, Funny)
Re:awright! (Score:2)
Re:awright! (Score:2)
Konqueror still does (by default!). Behold the wondrous power of KIO plugins!
Whew! I'm still safe (Score:5, Funny)
Its H82sd*e2Tn.
Nobody is ever going to crack that!!!
Disable LM Hash (Score:5, Informative)
http://support.microsoft.com/default.aspx?scid=KB
Re:Disable LM Hash (Score:2)
If you have 95/98 machines on your NT or 2000 network, your passwords are not secure, period.
Hashes (Score:5, Insightful)
Re:Hashes (Score:2)
Might as well just check the SHA1 hash. You won't gain anything by checking the MD5 hash as well.
Re:Hashes (Score:2)
I we think MD5 is too weak, we have to move to a stronger hash. MD5+SHA1 is not necessarily the best replacement.
Would there be any string of data which held the same hash for both MD5 and SHA1?
If you mean that 2 strings can have both the same MD5 ad the same SHA1, given the space of hashable data is at least as big as the space of has
Re:Hashes (Score:2)
yes there would. an MD5 hash is 32 hexadecimal digits, or 16 bytes. i'm not sure off the top of my head if SHA1 is the same, but for purposes of argument we will assume that it is. (regardless, it is a fixed number of characters from a finite set of possible characters, which is the main point here.)
so if we combine an MD5 hash and an SHA1 hash, we have essentially a 32 byte signature. Now if you are only using this to s
How long until... (Score:3, Funny)
And, yes, I am aware of the irony of posting this on election day in the US...
How long before it's a Web-Service? (Score:2)
Torrent? (Score:2)
DNS Entries (Score:2)
Microsoftie says use passphrases (Score:2)
if your interested in a rainbow table demo one can be found here [lasecwww.epfl.ch]
MD5 SHA (Score:2)
One DVD could easily handle:
Every Zip
Every 7-digit phone number
Every word in the dictionary (Upper, lower, and Capitalized)
Move up to a 2 disc set and get:
Every date
With a little work it'd probabl
It doesn't matter. Really. (Score:5, Informative)
If you have the LM Hash, and the server accepts LM Authentication, you don't need the password. At all.
Likewise, if you have the NTLM Hash, and the server accepts NTLM, NTLMv2, or LMv2 authentication, then you don't need the password.
The hashes are password equivalent.
I've written it all up in my online book [ubiqx.org] (slashdot review [slashdot.org]), but...
Basically, the hashes are generated with no salt...nothing to obfuscate them. The algorithm used to log in is challenge/response:
So... The hash is not exposed on the wire. It has to be reversed from the challenge and response. That's possible (and fairly easy with LM Auth), but it's got little to do with the password/LM Hash database.
The only way to use the LM Hash database to reverse the challenge/response is to use it as a hash dictionary.
Chris -)-----
Rainbow Tables , Make your own! (Score:3, Interesting)
5 average pc's ( all about 2000Mhz or so ) took about 30 days, and generated about 18Gb or tables.
Now these tables give us about 95%+ hit rate on any LM Hash we , erm "acquire"
The tables contain all hashes upto 14 Chars length using all letters all numbers and some symbols.
Just about the only hashes these tables wont hit are the machine generated ones.
I guess the point is turn *OFF* LM hashes at all cost, and if you absolutely "must" use them, make sure you kept them secure!
oh and a side note, if you are interested in cracking / brute forcing LM hashes, make sure to run them thru a copy of L0pht Crack or some such to get all the Blank, Pass==Name, Pass==Name-reversed hashes out of the way first.
Re:What is an LM hash? (Score:5, Informative)
The LM hash is relatively weak compared to the NT hash, and it is therefore prone to fast brute force attack.
Source: http://support.microsoft.com/default.aspx?scid=KB
Re:What is an LM hash? (Score:4, Informative)
I used to piss off the admins where I last worked by runnig L0hptCrack over their tightly secure network and telling them the admin password every time they changed it
You can and should switch this off unless you're using just a home LAN (beats me why it isn't off by default). Even better upgrade all your network to at least Win2k then disable NTLM entirely and use kerberos (samba 3 can be a full kerberos domain member).
(FYI: See:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\con
A value of 0 (the default) means you have no security.
Change it to 3 on your clients, or 5 on your Domain controller)
Re:What is an LM hash? (Score:5, Informative)
hash = a way of storing passwords without leaving the password on the disk. You encrypt the password into a hash code and store that instead. You can't unencrypt it to derive the password but you can check a password guess by encrypting the guess the same way. If the guess hash == the password hash, you get in.
The best part is, you don't have to keep the hash code a secret, because it's not the hard part. You're not asked to provide the hash value; you're asked to provide something that hashes to the value. So you can store it on the disk and even send it out over the LAN where it can be sniffed.
That's very convenient: you can cache the hash code on every computer without having to trouble the central server to do the work. You don't want to send the password over the network (where it could be sniffed); nor is sending the hash code to the server for verification (because that could be spoofed). You distribute the hash to each computer, then let it decide if the password guess is correct. The password never goes across the network.
That works as long as you can't decrypt the hash. But if you work long enough you can just brute force it: just run all the passwords until you come up with the one that hashes to the same value. And you can do it offline: you take the hash code back to your own computer(s) and do the brute force there. You're not sitting in front of the computer you want to hack.
The old LM hash code was relatively short; ten years ago when it was developed disk drives were much smaller. Now a combination of big disks and big processors (and clever algorithms) make it possible to brute-force it.
The thing is, Windows NT and later use NT hashes instead, which are more secure. But for compatability with Windows 95 and 98, by default they also store the LM hash code. Which means that your password is sitting on a visible place on the disk, encrypted in a way which is readily reversible to modern hackers.
That's been true for a while, but this new hack makes it trivial to decrypt; it used to take hours.
Re:Please explain (Score:4, Informative)
Re:Please explain (Score:3, Interesting)
Now, admittedly, it would still take ungodly long time to crack all the next possibilities, but it does save SOME time.
This also makes one wonder if the next generation of password cracking is to distribute the terrabytes of pre-digested passwords across multiple systems so that you have the "numbers only" database
Re:Please explain (Score:2)
I guess I was just thinking that someone could (as the people in the article did) just select some subset of passwords, generate all the hashes associated with those passwords, and publish it as a searchable database.
You know, Joe would generate hashes for all numbers, Sally would generate hashes for all letters and combinations with the number "1", etc.
Distributed that way, it wou
Re:And why do I care? (Score:2)
Re:And why do I care? (Score:2)
RTFA, eh? (Score:2)
Re:And why do I care? (Score:2)
Re:LM Hash (Score:2)
Re:LM Hash (Score:2)
Of course, I could be wrong. I use mostly *NIX at work and home. Just minimal exposure to MS.
[sarcasm]Being slashdot I'm sure that where I am in error will pointed out in a polite and respecful manner.[/sarcasm]
Making software? (Score:2)
Re:Microsoft's response? (Score:2)
So blame the 4 million corporate asshats who continue to run Win9x and won't cough up the money to upgrade to XP. You think Microsoft hasn't TRIED to make this problem go away?