Use this button to load hashes into Ophcrack. You can chose from: \n \
\n \
Single hash: to insert a single hash by hand into Ophcrack. \n \
\n \
PWDUMP File: to import hashes from a file compatible with the \n \
format used by pwdump. \n \
\n \
From Encrypted SAM: Import hashes from the SYSTEM and the SAM files \n \
located in the System32 directory of Windows. Note \n \
that you can only access this files from a Windows \n \
partition that has not booted. \n \
\n \
From Local SAM: Loads the hashes from the SAM of Windows system \n \
on which Ophcrack is running. You must be an\n \
administrator of the system to be able to do this.\n \
This is obviously only available in the Windows \n \
version of Ophcrack. \n \
\n \
From Remote SAM: Connects to a remote machine and retrieves the hashes \n \
from the SAM. You need to know the username and password \n \
of an administrator on the remote machine. You also need\n \
to know the name of a writable share on the remote machine.\n \
Only available in the Windows version of Ophcrack. \n \
\n \
");
tmp = lookup_widget(help_window,"help_delete");
gtk_label_set_text(GTK_LABEL(tmp)," \
This button deletes the hash that is currently selected in the \n \
main window. Use this function to remove the hashes in wihch \n \
you are not interested (e.g. the Guest account). This will \n \
accelerate the cracking of the remaining hashes. \n \
");
tmp = lookup_widget(help_window,"help_tables");
gtk_label_set_text(GTK_LABEL(tmp)," \
This is where you select the set of rainbow tables you want to use. \n \
Following table sets are suported by this version of Ophcrack:\n \
\n \
LM: Alphanumeric SSTIC04-10k: This is a small table set (388MB)\n \
which contains the LanManager hashes of 99.9% of all \n \
alphanumerical passwords. These are passwords made of \n \
mixed case letters and numbers (about 80 billion\n \
hashes). Because the LanManger hash cuts passwords\n \
into two pieces of 7 characters, passwords of length\n \
1 to 14 can be cracked with this table set. Since the\n \
LanManager hash is also not case sensitive, the 80 \n \
billion hashes in this table set corresponds to \n \
12 septillion (or 2^83) passwords. \n \
\n \
LM: Alphanumeric SSTIC04-5k: This table set also covers 99.9% of \n \
the LanManager hashes of all alphanumerical passwords\n \
Because the tables are about twice as big (720MB) \n \
cracking is about four times faster, but only if \n \
you have at least one GB of RAM.\n \
\n \
LM: Extended (alphanum + 33 special): This set covers 96% of \n \
the LanManger hashes of passwords made of up to 14 \n \
mixed case letters, numbers and the following 33 \n \
special characters: !\"#$%&'()*+,-./:;<=>?@[\\]^_`{|} ~\n \
There are about 7 trillion hashes in this table set\n \
covering 5 octillion (or 2^92) passwords\n \
\n \
NT: (6 ext, 7 alphanum, 8 lowalpha-num): This set contains NT hahses\n \
You can use this table set to crack the hashes on \n \
machines where the LanManager hash has been disabled.\n \
The set contains 99.0% of the hashes of the passwords \n \
made of the following characters: \n \
- up to six mixed case letters, numbers and 33 special\n \
characters (same as above) \n \
- seven mixed case letters and numbers \n \
- eight lowercase letters and numbers\n\n \
There are 7 trillion hashes in this table, corresponding\n \
to 7 trillion passwords (the NT hash does not suffer from\n \
the weaknesses of the LanManager). \n \
\n \
For most efficient cracking, start by deleting the hashes you do not \n \
want to crack. Then select an alphanumerical table set. Either the smaller\n \
one if you have 500MB or less of RAM or the larger one otherwise. Use the \n \
LM extented table set to crack the remaining hashes. If all LanManager \n \
hashes come up empty, the administrator has disabled them. Your only \n \
option is to use the NT table set. \n \
\n \
Note: the alphanumerical table sets are free and can be downloaded from \n \
the Internet. The other table sets can be ordered at \n \
http://www.objectif-securite.ch/ophcrack\n \
");
tmp = lookup_widget(help_window,"help_launch");
gtk_label_set_text(GTK_LABEL(tmp)," \
The launch button starts the cracking process. Don't forget to select a\n \
table set before launching the attack. Once the cracking process is \n \
started, the button transforms into a stop button. \n \
\n \
If you stop and restart a cracking session the hashes that have already\n \
been cracked will not be cracked a second time. However, the look-up \n \
process for the remaining hashes will start again at the beginning of\n \
the first table. \n \
\n \
Ophcrack will preload parts of the tables into memory depending on their\n \
size and on the amount of available RAM. The more tables it can fit \n \
into the RAM, the faster will be the attack. Under Windows you \n \
may want to quit other applications before launching the attack, to leave \n \
more memory available to Ophcrack. \n \
\n \
There are four tables in each table set. Ophcrack will cylce throuhg\n \
all four tables (one by one, two by two or more depending on available \n \
memory until it finds all hashes or arrives at the end of the last table. \n \
The status bar at the bottom of the window displays which tables are \n \
currently used and how far the look-up is in these tables. \n \
");
tmp = lookup_widget(help_window,"help_save");
gtk_label_set_text(GTK_LABEL(tmp)," \
Use the save button to save the current cracking session. The hases and \n \
the passwords that have already been cracked will be saved in a file\n \
in a format compatible with PWDUMP. You can later load the file using the\n \
\"PWDUMP File\" option of the Load button. \n\
");
gtk_widget_show(help_window);
}
void
on_help_window_close (GtkObject *object,
gpointer user_data)
{
gtk_widget_destroy(help_window);
gtk_widget_set_sensitive(main_window, 1);
}
void show_error_max_hash() {
GtkWidget *tmp;
GtkWidget* error_dialog = create_dialog1();
gtk_window_set_title (GTK_WINDOW (error_dialog), "Max number of hashes reached");
tmp = lookup_widget(error_dialog, "label3");
gtk_label_set_text(GTK_LABEL(tmp), "Warning: Only the first 35000 hashes have been loaded\nPlease split your hash file in several parts if you want to crack more than 35000 hashes.");