Password Extraction and Cracking - Paiet/SEC-335 GitHub Wiki
Objectives:
- List standard tools utilized to extract password hashes
- Utilize password hash extraction tools to retrieve password hashes
- Explain the process of LLMNR/NBT-NS Poisoning
- Utilize freely available tools to execute LLMNR poisoning attack
- Define password salting
- List and explain standard password policies used to defend against password attacks
- How do we get the password hashes from target computers?
- Post-compromise activity (usually)
- Windows Tools
pwdump7
fgdump
mimikatz
responder
- Linux
- Web/Database attacks
- Attacker could retrieve hashes from an insecure web app
- How do we crack these hashes to reveal the passwords?
- John the Ripper
- OCL-Hashcat
- Ophcrack
- Pass-the-Hash
- Don't even need to crack the hash
- Some systems will just use the hash
- Any suitable countermeasures?
- Good password policies
- Sufficient length
- Sufficient character sets
- No dictionary words
- Salt
- Any other ways to grab passwords?
- Key loggers
- Software-based
- Hardware-based