Password Cracking
this page needs to be heavely sorted and things need to be put into there corresponding categories
inside meterpreter
hashdump to dump password hashes
create a file for linux hashes of varying difficulties
to open a sam file .. you need sys key and sam file and then use follwing cmd
samdump2 sam syskey.txt
copying sam file change boot priority create a bootable kali pendrive do a live boot of kali linux on a windows system navigate to /media and navigate to system32 folder /windows/system32/config/sam once inside the directory samdump2 SAM /wer/ewt/we/syskey.txt > hashes.txt this is going to output hashes in a readable format
syskey needs to be given for decrypting it.
bios passwrd
online pswd cracking
offline passwd cracking
john windowshashes.txt jogn --format=nt hashesh.txt --wordlist=passlist.txt format of hashed paswrds
john --show hashes.txt [this is going to show result if it has already craked it ]
oclhashcat -> bsed upon using gpu
hashcat → without gpu
hashcat --help we need to tell the type of hash because hashcat can not guess by itself select one of the corresponding no. for hashes 1000 is for ntlm ..can be seen through --help hashcat -m 1000 Desktop/hashes.txt -o cracked.txt /usr/share/wordlists/rockyou.txt -m for mode / type of hash -o for output your hash file must only have hashed values ...delete any username or colons, or other text in your hash file -r /usr/share/hashcat/rules/best64.rule
password cracking tool : pwdump7 fgdump L0phtCrack Ophcrack Rainbow Crack CAin and Abel John the Ripper
Last updated
Was this helpful?