Windows Passwords Flashcards
1
Q
Where are all Windows passwords (except DC) stored?
A
- the SAM (Security Accounts Manager)
- a database stored as a registry file
- C:\Windows\System32\config
- HKEY_LOCAL_MACHINE\SAM
- not accessible while the OS is running
2
Q
What are the Windows password hashing formats?
A
- LM
- NT (all passwords from Windows 2000 are stored as NT)
3
Q
How can Windows passwords be Remotely dumped?
A
- passwords are dumped from the memory of the remote system, by loading a password dumping program remotely
- requires at least an administrative account
- pwdump, fgdump, ophcrack
4
Q
How can you use Metasploit to remote steal Windows hashes?
A
- getuid
- run hashdump
5
Q
How can you steal Windows hashes locally?
A
- requires physical access to the machine
- 2 methods:
- Running system: local admin; download hashes from memory
- Off-line system: decrypt the SAM stored in SYSTEM file
6
Q
Off-line steal Windows hashes with Kali?
A
- Boot Kali on the Windows system
- Mount the partition where Windows is installed (/mnt/sda1/WINDOWS/system32/config)
- samdump2 SAM syskey.txt > ourhashdump.txt
7
Q
What are some tools to crack Windows hashes?
A
- John the Ripper
- ## ophcrack