OMG Boreas doesn't know how to do something?? OOOMMMGGG!!! :gasp:
Printable View
OMG Boreas doesn't know how to do something?? OOOMMMGGG!!! :gasp:
erm...i could try and get them in an ISO all you need is.
This - http://www.magiciso.com/Setup_MagicISO.exe
I think then you place them in in the thing and burn them
Hope this helped lol....
And then click the add files button http://img482.imageshack.us/img482/2591/asdfes6.png And click save. And you should have your iso image.
I think he wanted them inside a linux bootable iso, with everything set up and the cracker all ready to go....
And I doubt that's very easy (unless, of course, you've done it before)
Oi Boreas, not too sure what I do exactly, but my computers free for about 10-13 hours every day. Sign me up for however many you think my computer could do in 10-13 hours per day :p.
http://img412.imageshack.us/img412/4...erspecszq0.png
^Thats my computer^ :)
It'd be my pleasure to help!
(Sorry, I'm in a strange mood, if you could explain how a tad bit clearer that would be great :p)
-Dunceiam
Edit---
Whew dunce get with the times! Noticed you've already finished 'em...So just ignore my post while I feel like an idiot..:p.
I cracked a school pc this way: Got a bootalbe usb stick, copied the necessary files (SAM and SYSTEM). Went to home and cracked the files there.
Got the pass and presto, it works :)
Boreas did it work on your pcs yet at work i mean?
Well it worked the way markus said (it was 'iamcool') but I'm still working on getting it work on a cd on vista like I have for xp.
There's something called a SAM file which contains a list of usernames with the hashes of their passwords. A hash is like encryption except it's one way. You can't un-hash it. The only thing you can do is hash a plaintext you know and compare the result to the hash of the password. If the hashes are the same then the plaintext you tried and the password are the same. Rainbowtables make combinations of characters, and make the hash of them. This means more work now and less work later, because you then just search through the table for the hash, and see the matching plaintext. This doesn't actually try logging in, it just looks at the SAM file. Google for more info.