"Computer skills" hack win7/win8 login Password

Source: Internet
Author: User

    

Pic via Baidu

 0x 00 hack ideas

The user's plaintext password is generated hash hash by one-way hash encryption, hash hash is encrypted and stored in the system disk \windiws\system32\config file

To get the clear text, you get the SAM file, extract the hash hash, and then search online or brute force to get the plaintext password.

There are two ways to get a SAM file:

1) obtained directly from the native operating system;

2) using a USB flash drive with Linux (or WinPE) installed;

Get the SAM file can be easily extracted to the user's hash, and then the cracked part of the

Directly on the hash hack website, let the website decryption, simple rough, but need money~

can also be brute force in this machine because of the irreversibility of individual encryption

The cracking process is actually a bunch of letter combinations to do hash encryption, the results obtained are compared with ciphertext

Not really cracked, fortunately the computer has a powerful computing power = =!

0x 01 hack test

Environment >>

Cracked Host: Win 7 Ultimate version 64-bit

Tools: bkhive (Generate Bootkey file for extracting hash hashes)

SAMDUMP2 (extract hash tool)

John (Brute force Hash is clear)

All three of the above tools are integrated into the USB drive (Kali)

As a result of the WIN8 and Win7 encryption algorithms, encrypted files are stored in the same location is the same here to demonstrate Win7 under the

    1. Generate Cracked Account

Win7 cmd, create two users to be cracked

    

NET user Frank 1t2e3n//add

    2. Extracting Sam Files

Set the machine to boot, plug in the USB drive, enter the Kali

Open My Computer, click on the Win7 system tray icon, this time Kali has Win7 system disk (Win7os) mounted to

/media, copy the Sam file and the system file under/media/win7os/windows/system32/config/

Note Case ~

cp/media/win7os/windows/system32/config/sam/tmp//media/win7os/windows/system32/config/system/tmp/ SYSTEM

    

    3. Extract Hash Hash

Generate a Bootkey file from the system file with Bkhive first

Use the SAMDUMP2 tool to extract hash hashes from Sam files and Bootkey

/*   Execute  in/tmp directory */> Hashes.txt

Hash hashes are stored in/tmp/hashes.txt, in the following format:

    

Most Windows operating systems now use NTLMV2 encryption, so the resulting LM hash is generally useless (the result of null-character encryption)

The above NTLM string is the hash hash we want to get.

  0x 04 Hack Hash

If the original plaintext password length is within 6 bits we can use the John the Ripper tool for blasting, very simple

The result of the native test is less than an hour all 6-bit-length passwords can be cracked successfully

/** *  /--format=nt2//  nt2 means using NTLMv2 hack

Then you can go to tea, let him run (in fact, I went to take a nap I will talk nonsense ~)

And then it's gone, look.

    

Frank and Alice's password have come out ~

Roughly, John, the speed of the NTMLv2 is roughly a second. 100多万条

So it's been a one-hour run, and there's no result. Suggested online decryption, CMD5 is a good site

There's a whole bunch of daoteng on it, and it's hard enough to look at it, if you get a glimpse of it, you earn:)

If the normal access to the machine can be directly extracted hash, artifact PWDUMP7 in this, directly run. exe can, address affixed to the back

If you get the system and Sam files, you can also get the hash tool under Windows saminside, import the file

If not, you can copy the file to the USB stick in cmd mode and then remove the hash hack.

Of course, all that is written in this file is to crack the login password, not to clear (reset)

Because what's the difference between clearing the reset and breaking the window and jumping in?

    

Tool Download:

PWDUMP7 Baidu Network disk http://pan.baidu.com/s/1D7jUu password: 91ud

Saninside Baidu Network disk Http://pan.baidu.com/s/1kT9RcjX password: bb1s

"Computer skills" hack win7/win8 login Password

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.