teknicalissue Posted May 10, 2008 Share Posted May 10, 2008 well this is a question to just simply satisfy my curiosity, i know there are programs like pwdump and things like that.. but all i want to know is how they work, where are these hashes located and how do those types of software retrieve em? Quote Link to comment Share on other sites More sharing options...
Sparda Posted May 10, 2008 Share Posted May 10, 2008 Hashing is one way. If the hash function is any good (Lanman is compleatly not) the passwords should be lost. Only methods such as rainbow tables or brute forcing are any good. Quote Link to comment Share on other sites More sharing options...
GonZor Posted May 11, 2008 Share Posted May 11, 2008 I think he was actually referring to how pwdump/fgdump extract the hash from the machine not how to crack the password. Quote Link to comment Share on other sites More sharing options...
teknicalissue Posted May 11, 2008 Author Share Posted May 11, 2008 yep thats what i meant Quote Link to comment Share on other sites More sharing options...
bluntm Posted May 13, 2008 Share Posted May 13, 2008 yea i have always wanted to know how to get the hash, form the computer, there is a lot on how to crack the hash Quote Link to comment Share on other sites More sharing options...
sbtUK Posted May 29, 2008 Share Posted May 29, 2008 I'm afraid I don't have the knowledge to furnish you with details about how the programs actually get the hashes from the file: I can tell you that the passwords / users file on a default WinXP install is: C:\WINDOWS\system32\config\sam The SAM file is just a text file as far as I know, although windows won't let you open it while windows is running. If you boot from a Linux live cd or similar with NTFS support you could open it up and have a look at it. Or you could make a copy of the file with the windows recovery console (There's an option for it when you boot from a winxp cd). Of course, you could use one of the programs you mentioned too :-P Quote Link to comment Share on other sites More sharing options...
snakey Posted May 30, 2008 Share Posted May 30, 2008 um irongeek did a bit on this he used hashtabs. This created heaps of different hashes and you can choose which ones to show and which ones not to show. Quote Link to comment Share on other sites More sharing options...
eman7613 Posted June 12, 2008 Share Posted June 12, 2008 i don't know if responding to older threads is a horrible sin and abomination against the trolls here, but i shall respond since im new, bored, and waiting to rip 18 cds. fist: program has to know were the target hash is located (ie: the sam file in windows as previously mentioned) second: You must know what hash method is used to generate said hash file. this can be accomplished with a good (ie: set the password to "bobyboy" and generate a hash from "bobyboy" using several different algorithms)hour or so of guess work work, or reduced to possibly fruitless reverse engineering if hashes are salted. third: generate and check hashes against the target untill you get a match (and technically, its possible to get two!) Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.