Sunday, May 3, 2009

EnTibr, the NTLM password brute forcer

And hereby I also present my open source, SSE2 optimized, NTLM password brute forcer, called EnTibr. This is almost the same code as the one used in EmDebr. I also used reversing of the MD4 algorithm, skipping the full 3rd round. With my own system I get around 150 Mhashes/s using 4 cores @ 3.2Ghz.

Again, I hope this helps others to understand reversing and maybe you can use my code to write a better/faster open source cracker. Feel free to leave a comment or to post some improvements!

The download links:

EnTibr_0.1_win32.zip
EnTibr_0.1_src.zip

You might also need to install the Microsoft Visual C++ 2008 Redistributable Package.

8 comments:

  1. I'm impressed, great work Daniel!

    ReplyDelete
  2. This is great and handy as I haven't the time or bandwidth to download a rainbow table. Thank you :)

    ReplyDelete
  3. I've love to see what this thing would do on a PS3! Thanks for all your hard work and thanks for sharing!

    ReplyDelete
  4. Hi Cliffy, tnx for your comment!

    I might adapt Psebr-md5 and make an Psebr-ntlm some time... feel free to try it yourself anytime soon, as all the code is available already :)

    ReplyDelete
  5. I've taken a look at the code to see about porting it to Mac OS X, but you are light years beyond me in coding ability.

    But I've got nothing to lose, so I'll give it a try.

    ReplyDelete
  6. Hi Daniel,
    if you want to fight with a real challenge try to develop a software for Kerberos 5 Pre Authentication (Windows):

    http://www.cerberusgate.com/benchmark_comparison.htm

    Your ability could invent something smart!
    :)
    jack

    ReplyDelete
  7. Hello,

    Any plan to make a GPU version?

    ReplyDelete
  8. How do I tell it to use non-ascii too?

    ReplyDelete