Password Attacks
Password Attacks
Identify a hash
hash_identifier
hashid <hash>DonPAPI
DonPAPI <DOMAIN>/<USERNAME>:<PASSWORD>@<RHOST>
DonPAPI -local_auth <USERNAME>@<RHOST>
DonPAPI --hashes <LM>:<NT> <DOMAIN>/<USERNAME>@<RHOST>
DonPAPI -laps <DOMAIN>/<USERNAME>:<PASSWORD>@<RHOST>Group Policy Preferences (GPP)
gpp-decrypt
python3 gpp-decrypt.py -f Groups.xml
python3 gpp-decrypt.py -c edBSHOwhZLTjt/QS9FeIcJ83mjWA98gw9guKOhJOdcqh+ZGMeXOsQbCpZ3xUjTLfCuNH8pG5aSVYYw/NglVmQHashcat
Custom Rules
Add a 1 to each Password
Capitalize first character
Add nothing, a 1 or a ! to an existing Wordlist
Rule for upper case Letter, numerical Value and special Character
$1 > appends a "1"
$2 > appends a "2"
$3 > appends a "3"
c > Capitalize the first character and lower case the rest
Rule Preview
Save into a new wordlist
Generating wordlists using CeWL
Hydra
Brute force login http / https
Brute force Baisc Auth authentication
Note the server response for invalid logins, in this case the server responded HTTP 401 (this is the flag F=)
John
Mimikatz
Common Commands
Dump Hashes
Pass the Ticket
Forging Golden Ticket
Skeleton Key
Cracking Password Managers
Keepass
PasswordSafe
Cracking SSH id_rsa password
Custom rules
Cracking ZIP password
Cracking openssl encrypted GZIP files
Once the for loop has finished, we can check the current directory for a newly extracted file.
Cracking BitLocker-encrypted drives
After successfully cracking the password, we can access the encrypted drive.
Mounting the Bitlocker-encrypted drives
First, we need to install the package using apt:
Next, we create two folders which we will use to mount the VHD.
We then use losetup to configure the VHD as loop device, decrypt the drive using dislocker, and finally mount the decrypted volume:
If everything was done correctly, we can now browse the files:
Once we have analyzed the files on the mounted drive, we can unmount it using the following commands:
Last updated