Penetration Testing mailing list archives

Re: [PEN-TEST] NT Passwors Cracking


From: mvanaswegen () DELOITTE CO ZA
Date: Thu, 30 Nov 2000 07:54:22 +0200

Hi Claude

Pwdump2 is great for extracting password hashed from "memory".
You can find it on http://packetstorm.securify.com
Just pipe it to a file and import it to your fav. password cracker.
pwdump2 > luser_hashes.txt

Marinus van Aswegen


-----Original Message-----
From: Beauregard, Claude Q [mailto:CQBeauregard () AAAMICHIGAN COM]
Sent: 29 November 2000 07:13
To: PEN-TEST () securityfocus com
Subject: [PEN-TEST] NT Passwors Cracking


Question: I used to L0phtcrack to download the hashes from the registry of
an NT server. The password hashes are  Syskeyed so L0phtcrack isn't going to
work (I believe I'm correct on this). I don't have direct access to the NT
server the hashes were downloaded from. Is there a way to save the hashes to
a file and run the file through another utility that will decrypt the
hashes.

Thanks
C


Current thread: