F1 Challenge 99 02 Crack No CD: Everything You Need to Know
with all of this in place, i went to work. the table below shows my results for the two passwords. in order to crack the last four characters in the password, i had to crack the first four using the following method:
f1 challenge 99 02 crack no cd
tcf password tcf password 2 tcf password 3 f1-passwd-hash-99-02.csv f1-passwd-hash-99-02.csv
im not going to crack the challenge passwords because there isnt much to learn from them, and because i dont need to get past the second hash. that said, i know that there are ways to protect yourself against these types of challenges. first and foremost, if you are doing a security review or threat analysis, make sure you know what you are doing.
next, use the field(s) you want to crack to authenticate yourself. in this case, i used the last four characters of the password, and filled in the first four with my initials. this was the first time i had used my initials as a password, and at first i didnt realize i was doing it, but i guess im just perverted. that said, i know many people who wouldnt try to crack their own passwords, and im not trying to shame them. i just wanted to make sure people were aware of the potential pitfalls of password cracking.
finally, after your initial application, choose a random server to perform your cracking on. this should be the same server you use to manage your password, and you should be able to find it via the netmux website or if you use a vpn, by using your company network