Penetration Testing mailing list archives

Re: [PEN-TEST] NT Passwors Cracking


From: "Beauregard, Claude Q" <CQBeauregard () AAAMICHIGAN COM>
Date: Thu, 30 Nov 2000 15:31:31 -0500

I thought about that but I have to be local to the server. I'm going to try
to place VNC for win32 on the server and see if I can execute it using
Hyena.

-----Original Message-----
From: Penetration Testers [mailto:PEN-TEST () SECURITYFOCUS COM]On Behalf
Of mvanaswegen () DELOITTE CO ZA
Sent: Thursday, November 30, 2000 12:54 AM
To: PEN-TEST () SECURITYFOCUS COM
Subject: Re: [PEN-TEST] NT Passwors Cracking


Hi Claude

Pwdump2 is great for extracting password hashed from "memory".
You can find it on http://packetstorm.securify.com
Just pipe it to a file and import it to your fav. password cracker.
pwdump2 > luser_hashes.txt

Marinus van Aswegen


-----Original Message-----
From: Beauregard, Claude Q [mailto:CQBeauregard () AAAMICHIGAN COM]
Sent: 29 November 2000 07:13
To: PEN-TEST () securityfocus com
Subject: [PEN-TEST] NT Passwors Cracking


Question: I used to L0phtcrack to download the hashes from the registry of
an NT server. The password hashes are  Syskeyed so L0phtcrack isn't going to
work (I believe I'm correct on this). I don't have direct access to the NT
server the hashes were downloaded from. Is there a way to save the hashes to
a file and run the file through another utility that will decrypt the
hashes.

Thanks
C


Current thread: