SlideShare a Scribd company logo
3
Most read
6
Most read
15
Most read
“Dumping and Cracking SAM Hashes
to Extract Plaintext Passwords”
By:
-Vishal Kumar
(CEH, CHFI, CISE, MCP)
info@prohackers.in
Lab - 1
“Dumping and Cracking SAM Hashes to
Extract Plaintext Passwords”
Pwdump7 can be used to dump protected files. You can always
copy a used file by executing pwdump7.exe –d c:lockedfile.dat
backup-lockedfile.dat Ophcrack is a free open-source (GPL
license) program that cracks Windows password by using LM
hashes through rainbow tables.
Lab Scenario
The Security Account Manager (SAM) is a database file present on
Windows machine that store user account and security decryptors
for users on local computer. It store user’s password in a hashes
format (in LM hash and NTLM hash). Because a hashes function is
one-way, this provide some measure of security for the storage of
the passwords.
In a system hacking life cycle, attackers generally dump
operating system password hashes immediately after a
compromise a target machine. The password hashes enable
attackers to launch a verity of attacks on system, including
password cracking, pass the hash, unauthorized access of other..
Lab Scenario
System using the same password, password analysis, and pattern
recognition, in order to crack other passwords in the target
environment.
You need to have administrator access to dump the content
of the SAM file. Assessment of a password strength is critical
milestone during your security assessment engagement. You will
start your password assessment with a simple SAM hash dump and
running it with a hash decryptor to uncover the plaintext
password.
Lab Objective
The objective of this lab is to help peoples to lean how to;
• Use the pwdump7 tool to extract password hashes.
• Use the Opcrack tool to crack the hash and obtain the
plaintext password.
Overview of the Lab
Pwdump7 can be used to dump protected file. You can always
copy a used file executing the command pwdump7.exe –d
c:lockedfile.dat backup-lockedfile.dat. Rainbow table for LM
hashes of alphanumeric passwords are provided free by the
developers. By default, Ophcrack is bundled with table that allow
it to crack passwords not longer then 14 characters using only
alphanumeric characters.
Lab Task 01:- Generate Hashes
• Open the command prompt, and navigate the location the
pwdump7 folder. Alternatively you can navigate from the windows
explorer to the pwdump7 folder and right-click and select open
Cmd Here.
• Now run the command pwdump7.exe, and press Enter. This
displays all the
Lab Task 01:- Generate Hashes
password hashes as shown in the above screenshot.
• Now, save the hashes in a text file by issuing the command
pwdump.exe >d:hashes.txt and press Enter, in this command
we are saving the hashes in the hashes.txt file in the D: drive.
• Now, open the D: drive and locate the hashes.txt and double-
click to open the
Lab Task 02:- Install Ophcrack
• Navigate to the directory you have saved the setup od Ophcrack
and double-click on the ophcrack-win32-installer-3.6.0.exe,
to install the Ophcrack. You can also download the Ophcrack
from the www.Ophcrack.sourceforge.net.
• Ophcrack installation window opens, click next to install the
application.
Lab Task 02:- Install Ophcrack
• In the choose components section, uncheck all the options,
and click Next
Lab Task 03:- Task 03:- Crack the Password
• On completion the installation
open the application from the
Apps screen . The Ophcrack
main window appears as shown
in the screenshot.
Lab Task 03:- Task 03:- Crack the Password
Click the Load menu and select
PWDUMP file. The Open PWDUMP file
window appears. Browse the D: and
select the hashes.txt which has been
created through Pwdump7, and click
Open.
Lab Task 03:- Task 03:- Crack the Password
• The hashes are loaded in the Ophcrack under the NT Hash
column. Now, click on the Table menu, the Table Selection
window appear, select Vista free and click Install.
Note:- to install the Tables you need to download the tables from the internet,
you can download the table from http://Ophcrack.sourceforge.net/tables.php.
• The Select the directory which contains the tables window
appears, brown the location where the table has been
downloaded or stored. Select the folder in which the tables are
stored and click Select Folder.
Lab Task 03:- Task 03:- Crack the Password
This tables_vist_free is a pre-
computed tables for reversing
cryptographic hash functions and
recovering a plaintext password up to
a certain length.
The selected table_vista_free is
installed under the name Vista free,
which is represented by a green
colored bullet. Select the table and
click OK.
Lab Task 03:- Task 03:- Crack the Password
• Click Crack on the menu
bar. Ophcrack begin to
crack the passwords.
• The cracked password are
displayed in the plaintext
as in the below screenshot.
Lab Analysis
We have analyze the password hashes gathered during this lab, and
figured out what the password was.
Tool/Utility Information Collected/Objectives Achieved
Pwdump7
Ophcrack
IP Address Range/target:- Windows 8.1
machine
Scan Result:-
•Generate the user password Hashes
•Crack the password in the plaintext
Feedback
Thanks for reading this presentation
Please give us your feedback at
info@prohackers.in
Your feedback is most valuable for us for improving the presentation
You can also suggest the topic on which you want the presentation
Website: www.prohackers.in
FB page: www.facebook.com/theprohackers2017
Join FB Group: www.facebook.com/groups/group.prohackers/
Watch us on: www.youtube.com//channel/UCcyYSi1sh1SmyMlGfB-Vq6A

More Related Content

PDF
encryption and hash algorithms
PPTX
Endpoint Security Solutions
PDF
ChuyenDeANM ung dung he thong IDS securityonion vao giam sat moi truong mang ...
PDF
Analysing Ransomware
PPTX
iOS-Application-Security-iAmPr3m
PDF
Lý thuyết giấu tin trong file audio
PPTX
Virus vs anti virus
PPT
Virus
encryption and hash algorithms
Endpoint Security Solutions
ChuyenDeANM ung dung he thong IDS securityonion vao giam sat moi truong mang ...
Analysing Ransomware
iOS-Application-Security-iAmPr3m
Lý thuyết giấu tin trong file audio
Virus vs anti virus
Virus

What's hot (20)

PPTX
Tổng quan về an toàn và bảo mật thông tin
DOC
Boot Process Of Ip Phone
PDF
Chương 8_Bảo mật và an ninh mạng
PDF
Giáo trình hệ điều hành PTIT
PDF
Lior rotkovitch ASM WAF unified learning – building policy with asm v12
PDF
Authentication: Cookies vs JWTs and why you’re doing it wrong
PDF
Parrot Security OS | Introduction to Parrot Security OS | Cybersecurity Train...
PPT
Email Headers – Expert Forensic Analysis
PPT
Lecture 3
DOCX
Bảo trì phần mềm
PDF
Quản lý người dùng
PPTX
What is Ransomware
PDF
Rà soát Malware bằng SysInternal Suite
PDF
Luận văn tốt nghiệp: Khai phá dữ liệu với R, HAY
PDF
Giao trinh an_toan_va_bao_mat_thong_tin_dh_bach_khoa_hn
PDF
CRYPTOGRAPHY AND NETWORK SECURITY
PDF
BÀI GIẢNG NHẬP MÔN LẬP TRÌNH KHOA HỌC DỮ LIỆU
PPTX
Bug Bounty 101
PDF
Spear Phishing Attacks
PPTX
HMAC - HASH FUNCTION AND DIGITAL SIGNATURES
Tổng quan về an toàn và bảo mật thông tin
Boot Process Of Ip Phone
Chương 8_Bảo mật và an ninh mạng
Giáo trình hệ điều hành PTIT
Lior rotkovitch ASM WAF unified learning – building policy with asm v12
Authentication: Cookies vs JWTs and why you’re doing it wrong
Parrot Security OS | Introduction to Parrot Security OS | Cybersecurity Train...
Email Headers – Expert Forensic Analysis
Lecture 3
Bảo trì phần mềm
Quản lý người dùng
What is Ransomware
Rà soát Malware bằng SysInternal Suite
Luận văn tốt nghiệp: Khai phá dữ liệu với R, HAY
Giao trinh an_toan_va_bao_mat_thong_tin_dh_bach_khoa_hn
CRYPTOGRAPHY AND NETWORK SECURITY
BÀI GIẢNG NHẬP MÔN LẬP TRÌNH KHOA HỌC DỮ LIỆU
Bug Bounty 101
Spear Phishing Attacks
HMAC - HASH FUNCTION AND DIGITAL SIGNATURES
Ad

Similar to Dumping and Cracking SAM Hashes to Extract Plaintext Passwords (20)

PDF
55 best linux tips, tricks and command lines
PDF
Chapter 1: Introduction to Command Line
PPTX
Chapter 1: Introduction to Command Line
PDF
Wamp & LAMP - Installation and Configuration
PDF
Matlab m files
PPTX
Installing Hortonworks Hadoop for Windows
PPTX
Post exploitation using powershell
PDF
Install websphere message broker 8 RHEL 6 64 bits
PPT
Linux
PPT
Power point on linux commands,appache,php,mysql,html,css,web 2.0
PPT
Linux presentation
PPTX
OpenNMS - My Notes
PDF
linux installation.pdf
DOCX
Bc0056 unix operating system
PPTX
THE BASIC TOOLS
PDF
Java Programming
PDF
202110 SESUG 49 UNIX X Command Tips and Tricks
DOC
Exploit Frameworks
PPTX
Linux week 2
PDF
Sergei Stryukov.Drush.Why it should be used.DrupalCamp Kyiv 2011
55 best linux tips, tricks and command lines
Chapter 1: Introduction to Command Line
Chapter 1: Introduction to Command Line
Wamp & LAMP - Installation and Configuration
Matlab m files
Installing Hortonworks Hadoop for Windows
Post exploitation using powershell
Install websphere message broker 8 RHEL 6 64 bits
Linux
Power point on linux commands,appache,php,mysql,html,css,web 2.0
Linux presentation
OpenNMS - My Notes
linux installation.pdf
Bc0056 unix operating system
THE BASIC TOOLS
Java Programming
202110 SESUG 49 UNIX X Command Tips and Tricks
Exploit Frameworks
Linux week 2
Sergei Stryukov.Drush.Why it should be used.DrupalCamp Kyiv 2011
Ad

More from Vishal Kumar (20)

PDF
Threat Hunting Procedures and Measurement Matrice
PDF
The Complete Questionnaires About Firewall
PDF
E-mail Security Protocol - 2 Pretty Good Privacy (PGP)
PDF
E-Mail Security Protocol - 1 Privacy Enhanced Mail (PEM) Protocol
PDF
Privileges Escalation by Exploiting Client-Side Vulnerabilities Using Metasploit
PDF
Exploiting Client-Side Vulnerabilities and Establishing a VNC Session
PPTX
Auditing System Password Using L0phtcrack
PPTX
Fundamental of Secure Socket Layer (SSL) | Part - 2
PDF
The Fundamental of Electronic Mail (E-mail)
PPTX
Fundamental of Secure Socket Layer (SSl) | Part - 1
PPTX
The Fundamental of Secure Socket Layer (SSL)
PPTX
Hawkeye the Credential Theft Maalware
PPTX
Deep understanding on Cross-Site Scripting and SQL Injection
PPTX
Owasp top 10 security threats
PPTX
Exploiting parameter tempering attack in web application
PPTX
Mirroring web site using ht track
PPTX
Collecting email from the target domain using the harvester
PPTX
Information gathering using windows command line utility
PPTX
Introduction ethical hacking
PPTX
Social engineering
Threat Hunting Procedures and Measurement Matrice
The Complete Questionnaires About Firewall
E-mail Security Protocol - 2 Pretty Good Privacy (PGP)
E-Mail Security Protocol - 1 Privacy Enhanced Mail (PEM) Protocol
Privileges Escalation by Exploiting Client-Side Vulnerabilities Using Metasploit
Exploiting Client-Side Vulnerabilities and Establishing a VNC Session
Auditing System Password Using L0phtcrack
Fundamental of Secure Socket Layer (SSL) | Part - 2
The Fundamental of Electronic Mail (E-mail)
Fundamental of Secure Socket Layer (SSl) | Part - 1
The Fundamental of Secure Socket Layer (SSL)
Hawkeye the Credential Theft Maalware
Deep understanding on Cross-Site Scripting and SQL Injection
Owasp top 10 security threats
Exploiting parameter tempering attack in web application
Mirroring web site using ht track
Collecting email from the target domain using the harvester
Information gathering using windows command line utility
Introduction ethical hacking
Social engineering

Recently uploaded (20)

PPTX
Introuction about WHO-FIC in ICD-10.pptx
PDF
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
PPTX
QR Codes Qr codecodecodecodecocodedecodecode
PDF
Testing WebRTC applications at scale.pdf
PPTX
introduction about ICD -10 & ICD-11 ppt.pptx
PDF
Sims 4 Historia para lo sims 4 para jugar
PDF
RPKI Status Update, presented by Makito Lay at IDNOG 10
PDF
The Internet -By the Numbers, Sri Lanka Edition
PDF
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
PPTX
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
PPTX
Funds Management Learning Material for Beg
PDF
Slides PDF The World Game (s) Eco Economic Epochs.pdf
PPTX
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
PPTX
SAP Ariba Sourcing PPT for learning material
PPTX
INTERNET------BASICS-------UPDATED PPT PRESENTATION
PDF
Triggering QUIC, presented by Geoff Huston at IETF 123
PDF
Decoding a Decade: 10 Years of Applied CTI Discipline
PDF
The New Creative Director: How AI Tools for Social Media Content Creation Are...
PPTX
Digital Literacy And Online Safety on internet
PPTX
Slides PPTX World Game (s) Eco Economic Epochs.pptx
Introuction about WHO-FIC in ICD-10.pptx
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
QR Codes Qr codecodecodecodecocodedecodecode
Testing WebRTC applications at scale.pdf
introduction about ICD -10 & ICD-11 ppt.pptx
Sims 4 Historia para lo sims 4 para jugar
RPKI Status Update, presented by Makito Lay at IDNOG 10
The Internet -By the Numbers, Sri Lanka Edition
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
Funds Management Learning Material for Beg
Slides PDF The World Game (s) Eco Economic Epochs.pdf
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
SAP Ariba Sourcing PPT for learning material
INTERNET------BASICS-------UPDATED PPT PRESENTATION
Triggering QUIC, presented by Geoff Huston at IETF 123
Decoding a Decade: 10 Years of Applied CTI Discipline
The New Creative Director: How AI Tools for Social Media Content Creation Are...
Digital Literacy And Online Safety on internet
Slides PPTX World Game (s) Eco Economic Epochs.pptx

Dumping and Cracking SAM Hashes to Extract Plaintext Passwords

  • 1. “Dumping and Cracking SAM Hashes to Extract Plaintext Passwords” By: -Vishal Kumar (CEH, CHFI, CISE, MCP) info@prohackers.in Lab - 1
  • 2. “Dumping and Cracking SAM Hashes to Extract Plaintext Passwords” Pwdump7 can be used to dump protected files. You can always copy a used file by executing pwdump7.exe –d c:lockedfile.dat backup-lockedfile.dat Ophcrack is a free open-source (GPL license) program that cracks Windows password by using LM hashes through rainbow tables.
  • 3. Lab Scenario The Security Account Manager (SAM) is a database file present on Windows machine that store user account and security decryptors for users on local computer. It store user’s password in a hashes format (in LM hash and NTLM hash). Because a hashes function is one-way, this provide some measure of security for the storage of the passwords. In a system hacking life cycle, attackers generally dump operating system password hashes immediately after a compromise a target machine. The password hashes enable attackers to launch a verity of attacks on system, including password cracking, pass the hash, unauthorized access of other..
  • 4. Lab Scenario System using the same password, password analysis, and pattern recognition, in order to crack other passwords in the target environment. You need to have administrator access to dump the content of the SAM file. Assessment of a password strength is critical milestone during your security assessment engagement. You will start your password assessment with a simple SAM hash dump and running it with a hash decryptor to uncover the plaintext password.
  • 5. Lab Objective The objective of this lab is to help peoples to lean how to; • Use the pwdump7 tool to extract password hashes. • Use the Opcrack tool to crack the hash and obtain the plaintext password.
  • 6. Overview of the Lab Pwdump7 can be used to dump protected file. You can always copy a used file executing the command pwdump7.exe –d c:lockedfile.dat backup-lockedfile.dat. Rainbow table for LM hashes of alphanumeric passwords are provided free by the developers. By default, Ophcrack is bundled with table that allow it to crack passwords not longer then 14 characters using only alphanumeric characters.
  • 7. Lab Task 01:- Generate Hashes • Open the command prompt, and navigate the location the pwdump7 folder. Alternatively you can navigate from the windows explorer to the pwdump7 folder and right-click and select open Cmd Here. • Now run the command pwdump7.exe, and press Enter. This displays all the
  • 8. Lab Task 01:- Generate Hashes password hashes as shown in the above screenshot. • Now, save the hashes in a text file by issuing the command pwdump.exe >d:hashes.txt and press Enter, in this command we are saving the hashes in the hashes.txt file in the D: drive. • Now, open the D: drive and locate the hashes.txt and double- click to open the
  • 9. Lab Task 02:- Install Ophcrack • Navigate to the directory you have saved the setup od Ophcrack and double-click on the ophcrack-win32-installer-3.6.0.exe, to install the Ophcrack. You can also download the Ophcrack from the www.Ophcrack.sourceforge.net. • Ophcrack installation window opens, click next to install the application.
  • 10. Lab Task 02:- Install Ophcrack • In the choose components section, uncheck all the options, and click Next
  • 11. Lab Task 03:- Task 03:- Crack the Password • On completion the installation open the application from the Apps screen . The Ophcrack main window appears as shown in the screenshot.
  • 12. Lab Task 03:- Task 03:- Crack the Password Click the Load menu and select PWDUMP file. The Open PWDUMP file window appears. Browse the D: and select the hashes.txt which has been created through Pwdump7, and click Open.
  • 13. Lab Task 03:- Task 03:- Crack the Password • The hashes are loaded in the Ophcrack under the NT Hash column. Now, click on the Table menu, the Table Selection window appear, select Vista free and click Install. Note:- to install the Tables you need to download the tables from the internet, you can download the table from http://Ophcrack.sourceforge.net/tables.php. • The Select the directory which contains the tables window appears, brown the location where the table has been downloaded or stored. Select the folder in which the tables are stored and click Select Folder.
  • 14. Lab Task 03:- Task 03:- Crack the Password This tables_vist_free is a pre- computed tables for reversing cryptographic hash functions and recovering a plaintext password up to a certain length. The selected table_vista_free is installed under the name Vista free, which is represented by a green colored bullet. Select the table and click OK.
  • 15. Lab Task 03:- Task 03:- Crack the Password • Click Crack on the menu bar. Ophcrack begin to crack the passwords. • The cracked password are displayed in the plaintext as in the below screenshot.
  • 16. Lab Analysis We have analyze the password hashes gathered during this lab, and figured out what the password was. Tool/Utility Information Collected/Objectives Achieved Pwdump7 Ophcrack IP Address Range/target:- Windows 8.1 machine Scan Result:- •Generate the user password Hashes •Crack the password in the plaintext
  • 17. Feedback Thanks for reading this presentation Please give us your feedback at info@prohackers.in Your feedback is most valuable for us for improving the presentation You can also suggest the topic on which you want the presentation Website: www.prohackers.in FB page: www.facebook.com/theprohackers2017 Join FB Group: www.facebook.com/groups/group.prohackers/ Watch us on: www.youtube.com//channel/UCcyYSi1sh1SmyMlGfB-Vq6A

Editor's Notes