make getpeername() return the original socket address which before it was intercepted
[hband-tools.git] / user-tools / nthash.py
blobb75a469f4d7c3ed4000f649378198bd460d3e8df
1 #!/usr/bin/env python
3 import smbpasswd
4 import sys
6 passwd = sys.argv[1]
8 print 'LANMAN hash is', smbpasswd.lmhash(passwd)
9 print 'NT hash is', smbpasswd.nthash(passwd)
11 print 'both hashes at once = %s:%s (lm:nt)' % smbpasswd.hash(passwd)