Penetration Testing mailing list archives
Re: [PEN-TEST] NT Passwors Cracking
From: "Beauregard, Claude Q" <CQBeauregard () AAAMICHIGAN COM>
Date: Thu, 30 Nov 2000 15:31:31 -0500
I thought about that but I have to be local to the server. I'm going to try to place VNC for win32 on the server and see if I can execute it using Hyena. -----Original Message----- From: Penetration Testers [mailto:PEN-TEST () SECURITYFOCUS COM]On Behalf Of mvanaswegen () DELOITTE CO ZA Sent: Thursday, November 30, 2000 12:54 AM To: PEN-TEST () SECURITYFOCUS COM Subject: Re: [PEN-TEST] NT Passwors Cracking Hi Claude Pwdump2 is great for extracting password hashed from "memory". You can find it on http://packetstorm.securify.com Just pipe it to a file and import it to your fav. password cracker. pwdump2 > luser_hashes.txt Marinus van Aswegen -----Original Message----- From: Beauregard, Claude Q [mailto:CQBeauregard () AAAMICHIGAN COM] Sent: 29 November 2000 07:13 To: PEN-TEST () securityfocus com Subject: [PEN-TEST] NT Passwors Cracking Question: I used to L0phtcrack to download the hashes from the registry of an NT server. The password hashes are Syskeyed so L0phtcrack isn't going to work (I believe I'm correct on this). I don't have direct access to the NT server the hashes were downloaded from. Is there a way to save the hashes to a file and run the file through another utility that will decrypt the hashes. Thanks C
Current thread:
- Re: [PEN-TEST] NT Passwors Cracking Ryan Russell (Dec 01)
- <Possible follow-ups>
- Re: [PEN-TEST] NT Passwors Cracking mvanaswegen (Dec 01)
- Re: [PEN-TEST] NT Passwors Cracking Conor Crowley (Dec 01)
- Re: [PEN-TEST] NT Passwors Cracking Beauregard, Claude Q (Dec 01)
- Re: [PEN-TEST] NT Passwors Cracking Beauregard, Claude Q (Dec 01)