Windows Hash cracking
Last updated
Last updated
❗ In order to set up persistence, administrative privileges are required.
Open a new tab and create a .txt
file with the dumped hashes. Paste the Administrator
and bob
hashes
Metasploit module can be used to brute-force the hashes.
In this case John The Ripper will be used as an example
- Open Source password security auditing and password recovery tool available for many operating systems
Use the rockyou.txt
wordlist instead
Crack NTLM hashes with hashcat
brute-force
Try RDP login
- Open Source advanced password recovery utility, supporting five unique modes of attack for over 300 highly-optimized hashing algorithms