Skip to main content
This document is for people who want to learn to the how and why of password cracking. There is a lot of information being presented and you should READ IT ALL BEFORE you attempted doing anything documented here. I do my best to provide step by step instructions along with the reasons for doing it this way. Other times I will point to a particular website where you find the information. In those cases someone else has done what I attempting and did a good or great job and I did not want to steal their hard work. These instructions have several excerpts from a combination of posts from pureh@te, granger53, irongeek, PrairieFire, RaginRob, stasik, and Solar Designer. I would also like to thank each of them and others for the help they have provided me on the BackTrack forum.

The PDF cover both getting the SAM from inside windows and from the BackTrack CD, DVD, or USB flash drive. The SAM is the Security Accounts Manager database where local usernames and passwords are stored. For legal purposes I am using my own system for this article. The first step is to get a copy of  called fgdump from http://www.foofus.net/fizzgig/fgdump/ This new utility will dump passwords from clients and Active Directory (Windows 2000 and 2003 for sure, not sure about Windows 2008) where pwdump7 only dumps client passwords. 

NOTE: Some anti-virus software packages flag pwdump* and fgdump as trojan horse programs or some other unwanted program. If necessary, you can add an exclusion for fgdump and/or pwdump to your anti-virus package so it won't flag them. However it is better for the community if you contact your anti-virus vendor and ask them to not flag the tool as a virus/malware/trojan horse.
 


Title: Cracking Passwords Guide
File Name: Cracking_Passwords_Guide.pdf
File Type: PDF
File Size:  271.8 KB

Comments

Popular posts from this blog

Netwars Competition

The NetWars game is a collection of computer and network security challenges. It is designed to represent real-world security issues: their flaws and their resolutions. Each player can follow an independent path based on individual problem solving skills, technical skills, aptitude, and creativity. The game is played in a fun but safe environment using the technology that drives our lives every day. The game starts when a player downloads and starts a CD-ROM image on a PC or in a virtual environment such as VMware Player. The image contains a brief tutorial and the game's full instructions. The player must find a hidden key within the image that is downloaded and then uses that key to enter an online environment where knowledge of security vulnerabilities and their exploits can be turned into points. Upcoming Competitions   June 18-20, 2010 PST September 17-19, 2010 November 5-7, 2010 December 17-19, 2010 April 29 - May 1, 2011 Click Here to read more

Learning Linux

Learning linux from the ground up is really a challenge. As you progress even more you start customizing your OS from how it starts and how it shutdown. As soon as you start on a Live CD your x server is pretty much either gnome or KDE. I mean it looks easy to do, but as soon as you start research how the x server it can get trick. My recommendation is to also learn the bash line or command prompt. if your good with the line commands then reconfiguring your computer shouldn't be a problem, but you just learn the GUI layer of it and not the line commands believe me your going to have hard time restoring your computer. As I ask people around they say linux is hard to install. The easiest way to partition your drive manually is like this. sda1 /home -- This is where you want to store all your data in case your linux gets corrupted. This space can be as big as you want sda2 /swap -- Linux is just like windows it needs it virtual space. The swap size depends on your phys...

WPA Encryption

Yes it can be crack the only issue is that you really need a huge dictionary list the more the better. what does this mean it just means that you just have to think of a long pass-phrase for your password. Back in mid 2005 you just needed a good CPU to process large amount of data, but now on curtain NVidia cards it can speed up decryption 8 characters - This is consider weak password to industry standards. 20 characters - This is the minimum for industry standards. 63 characters - This is the maximum and consider tough to crack. You may start thinking that any wireless connection is unsafe well its like a catch-22. There are tools out there that can alert you when a hacker is attempting to get in your network. I know most large corporations do have these tools they can either software or hardware. Remember, doing this illegal without the person or corporations permission, but its legal to try it at your own home router. Want to see the process of cr...