One way to also test your environment is to create password that is
longer
I think you are mistaken. You should try it and see if you are
misinterpreting what you are seeing in your results. In other words, see
what it looks like when there can't possibly be an LM hash.
i didn't try it. Microsoft says that one way to avoid storing an LM Hash is
to create a password longer than 14 characters. Well that's just not good
enough that i won't even bother.
I'm confused. Unless the password is blank, then whatever is being stored
in the "blank" LM hash is garbage and won't allow anyone to log on.
If you use the LM Hash algorithm to hash <nothing>, then you get
AAD3B435B51404EEAAD3B435B51404EE
which is the hash for nothing
The NTLM hash for <nothing> is
31D6CFE0D16AE931B73C59D7E0C089C0
So when i see a password that has an "empty" LM hash, but an "non-empty"
NTLM hash, then i know it is not storing the LM Hash, even though it is
storing the NTLM hash, and hence has a real password.
So whenever i see the "AAD3.." i know there is no LM hash being stored.
When I pointed out that the LM hashes from your print out were in all lower
case letters, I was doubting that what you were seeing there were really
passwords cracked from the LM hash, because I would normally expect
passwords cracked from LM hashes to be in all UPPER CASE.
Yes, i understand that the LM hash algorithm converts the password to
UPPERCASE and hashes the first and last 7 characters as two separate hashes.
i converted them to lowercase in my post, and they were almost CERTAINLY not
entered as uppercase into Windows, and so really would be a lowercase
password.
i see your confusion in a couple of posts regarding the lowercase passwords.
i wasn't posting the results of a password cracker; i was trying to post the
actual passwords. Windows NT,2000,XP,2003 is case sensitive, and it is
almost a guarantee that nobody has uppercase passwords. So i implicitly
convert them to lowercase.
The idea was to post the password for a given account. i accomplished that
by cracking the LMHash, but the crack of the LM Hash doesn't give you the
actual password.
I asked a few
questions and made a few suggestions in my last post, did you try any of
them, and if so, what happened? Are you assuming they won't help you?
i have already found the fix, and posted it in this thread. (Create a
NoLMHash key, verses trying to use a group policy editor or create a
NoLMHash value).