Category: Tools

Rainbow Table – LM All 1-7 120GB Download

The Hak5 RainbowTables project has finished generating the 120GB LM All tableset, and they are now available for public download via Bittorrent.

Technical Details
Charset: all (ABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789!@#$%^&*()-_+=~`[]{}|:;”’,.?/)

Plaintext Length Range: 1-7

Key Space: 68^1 + 68^2 + 68^3 + 68^4 + 68^5 + 68^6 + 68^7 = 6823331935124

Disk Usage: 120GB

Success Rate: 1 – (1 – calc_success_prob(6823331935124, 9000, 8000000000/8)) ^ 8 = 0.9990

Mean/Max cryptanalysis time: 197.0106s/915.2542s*

Max Disk Access Time: 3802.2s*

Typical 666MHz CPU

The Torrent download is available here: hak5_rtables_lm_all_1-7.torrent

What is a Rainbow Table?
A rainbow table is a lookup table offering a time-memory tradeoff used in recovering the plaintext password from a password hash generated by a hash function, often a cryptographic hash function. A common application is to make attacks against hashed passwords feasible. Salt is often employed with hashed passwords to avoid this attack.

A full description can be found here:


Tate Hanson, of ClearNet Security, produced an excellent web application called nmapTweaker that helps perfect nmap syntax.

From the article:

We’re playing w/RoR and building a few web apps. I wrote a quick and easy one that helps you build a command line for nmap, nothing particularly special.

I did add some extra content: tuning tips, examples, and a time estimator. Basically you can use it to build a command line, then copy and paste it to wherever you want to run it.

It does not do syntax checking for nmap options which require input yet (e.g. targets, output file name, etc.), but the app does do some error checking for conflicting options.

It’s a little rough, but hey, it might save you a few minutes of time if you’re not an nmap option sage.

Good work Tate.

Scroll to top