How do I find out the windows password hashing is using? lm, ntlm, ntlmv2?
I am trying to find out the windows login password a computer is using. I do not have administrator privilege. I could boot from a cd. Does Offline NT Password & Registry Editor helps? How to find out?
This is the hash I dumped out from a boot cd:
Administrator:500:FC6C1371650726D5963A9B259AE5C80029:2437E445C0E704A73CAC16E219B42588XX:::
It has 34 digit instead of normally 32. You can see a XX at the end. So I am guessing it's using another type of hashing.
Any body has any suggestion or comment?