Security Basics mailing list archives

Re: How does the Cain and Abel SAM dump works?


From: "Carlos Madrid" <chalonga () gmail com>
Date: Tue, 15 Jul 2008 17:42:52 -0500

Some advice.. only try to crack the LM hashes.  They won't be longer
then 14 chars.

Also read a little bit for more info:
http://en.wikipedia.org/wiki/LM_hash

The hashes are best retrieved with dll injection into lsass.

Random link to save me typing:
http://www.lcpsoft.com/english/articles/passwords.htm


On Mon, Jul 14, 2008 at 3:54 AM, Vikas Singhal
<vikas.programmer () gmail com> wrote:
Hi Friends,

Nowaday, I am studying on the Topic - Cracking Windows password.

There are lot of tools out there which can dump LM and NTLM hashes for
you. But as far i know, you can't touch the SAM file when windows is
running, so, how does these tools work.

Is the sam dumped in-memory?

Regards
V



Current thread: