✍️
OSCP Prep
  • Welcome Aboard
  • Linux Basics
    • Command Line Fundamentals
  • Writeups
    • HackTheBox
      • Windows
        • Granny
        • Devel
        • Blue
        • Legacy
      • Linux
        • shocker
    • OSPG
    • TryHackMe
    • Vulnhub
      • Kioptrix Level1
  • Scanning and Enumeration
    • Index
    • Wordpress
      • wpscan
    • NMAP
    • DNS
    • NFS
    • DB
      • Oracle DB 1521
      • MySQL
    • SMB
      • msfconsole
      • crackmapexec
      • smbmap
      • smbclient
      • enum4linux
      • Mount smb share locally
    • SSH
    • HTTP
      • PUT Method
      • Untitled
  • Tools and Techniques
    • File Transfer
    • CMD-Fu
    • Cross Platform Exploit Compilation
    • Bash-Fu
    • Sniffing
      • tcpdump
      • Wireshark
    • Brute Force
      • Untitled
      • Hydra
    • Msfvenom
    • Password Cracking
      • John
      • Hashcat
  • Gaining Access and Exploitation
  • SQL Injection
    • sqlmap
    • mysql syntax
    • ms sql syntax
  • File Upload
  • LFI
  • Privilege Escalation
    • Windows
      • references links
      • Manual
        • SeTokenImpersonate
      • Scripts
    • Linux
      • Manual
        • Know your Enemy
      • Scripts
  • Mislu Tips
    • Troubleshooting
  • Buffer OverFlow under 30 min.
    • point n shoot
    • fuzzer.py
    • Addons reading material
  • Active Directory
    • Untitled
Powered by GitBook
On this page
  • syskey needs to be given for decrypting it.
  • bios passwrd
  • online pswd cracking
  • offline passwd cracking
  • john --show hashes.txt [this is going to show result if it has already craked it ]
  • hashcat → without gpu

Was this helpful?

  1. Tools and Techniques

Password Cracking

this page needs to be heavely sorted and things need to be put into there corresponding categories

inside meterpreter

hashdump to dump password hashes

create a file for linux hashes of varying difficulties

to open a sam file .. you need sys key and sam file and then use follwing cmd

samdump2 sam syskey.txt

copying sam file change boot priority create a bootable kali pendrive do a live boot of kali linux on a windows system navigate to /media and navigate to system32 folder /windows/system32/config/sam once inside the directory samdump2 SAM /wer/ewt/we/syskey.txt > hashes.txt this is going to output hashes in a readable format

syskey needs to be given for decrypting it.

bios passwrd

online pswd cracking

offline passwd cracking

john windowshashes.txt jogn --format=nt hashesh.txt --wordlist=passlist.txt format of hashed paswrds

john --show hashes.txt [this is going to show result if it has already craked it ]

oclhashcat -> bsed upon using gpu

hashcat → without gpu

hashcat --help we need to tell the type of hash because hashcat can not guess by itself select one of the corresponding no. for hashes 1000 is for ntlm ..can be seen through --help hashcat -m 1000 Desktop/hashes.txt -o cracked.txt /usr/share/wordlists/rockyou.txt -m for mode / type of hash -o for output your hash file must only have hashed values ...delete any username or colons, or other text in your hash file -r /usr/share/hashcat/rules/best64.rule

password cracking tool : pwdump7 fgdump L0phtCrack Ophcrack Rainbow Crack CAin and Abel John the Ripper

PreviousMsfvenomNextJohn

Last updated 3 years ago

Was this helpful?