Dumping NTLM Hash’s from Windows with Fgdump.

简介: With the release of the new Question-Defense online NTLM, MD5 and MD4 cracker I decide to write...

With the release of the new Question-Defense online NTLM, MD5 and MD4 cracker I decide to write a quick how to on grabbing the hash’s from a windows system. In order for this to work you need at least one username and logon of a user with admin privileges. I may in the future write a article on how to escalate your privileges from a user to a admin, but for the sake of this article will assume you know at least one admin user log on.

 

The tool I am going to use is called fgdump and is available here . The are other tools called PWDump which achieve the same result but I really like fgdump so I use it for all my hash dumping needs. My target is going to be a Windows 2003 server, but this will work on XP, Vista and Windows 7.

The tool can just be run on the local machine with no arguments at all and will dump the hash’s to a log file:

1-20-2010-7-33-49-PM

Now this is pretty easy but what if you do not have physical access to the server?

We can use fgdump remotely which is the way I generally use it.

Lets run a quick scan of our target and make sure its up with the proper ports open for the connection:

1-20-2010-7-11-55-PM

Ok so we see if our server target is up.

I use a great many command line windows tool so I try to keep them all in the C:/tools directory and add it to the path. I also like to have my cygwin binaries in the path so I can have UNIX like commands in my windows terminal. Check this article if you are interested in doing that.

So lets run our tool. Its pretty much the same we just need to add a few arguments:

  1. -h the ip of the host
  2. -u the username
  3. -p the password

1-20-2010-7-13-48-PM

Once we hit enter and execute the fgdump.exe it will notify us if the command completed successfully or not:

1-20-2010-7-14-17-PM

As you can see we had a successful dump. This will be saved in a log file in pwdump format on the machine we ran the tool from.

Lets see what that looks like:

1-20-2010-7-15-12-PM

Now this is the part where most people get confused. Windows actually uses two kinds of hashing algorithms. The first is called LM which is old and obsolete and is actually turned of by default in Windows Vista and Windows 7. The second one is called NTLM which is the one we are currently interested in.

So at this point you are probably wondering what part of that gibberish is the actual NTLM hash.

Lets open it in notepad so we can get a better look:

 

1-20-2010-7-16-33-PM

So lets break down the fields:

Alex:1004:F5D023D8475D3F6E144E2E8ADEF09EFD:6E6212F9FAC92682C51BB68DDC4819D7:::

The fields are separated by colons. So the first field is clearly the username, the second field is the user id, the third field is the LM hash. On systems with LM disabled like Windows 7, this will be blank. The final field is the NTLM hash we are interested in. I have highlighted the correct section of the hash in the picture in order to be really clear on the subject.

Once you have the hash, just copy it to you clipboard and open up our online cracker and select a option and let Question-Defense’s servers  do the hard work for you:

1-20-2010-7-18-36-PM

Once your job has been completed the results will be emailed to you. And not one ounce of CPU power on your local machine used. We also offer special rates for companies who are interested in auditing large lists of passwords to make sure their users are practicing secure password policies.

目录
相关文章
|
安全 数据安全/隐私保护 Windows
|
安全 数据库 Windows
Hash injection Attacks in a Windows Network
又是转载的,没啥含量,呵呵。   aka   Why an exposed LM/NTLM Hash is comparable to a clear-text password   aka...
1003 0
|
Windows
nmap dump windows hash
While on a penetration test it is sometimes necessary to pull hash files from windows systems to crack weak passwords.
696 0
|
Windows
Dump Hash From Windows 2003【转自www.bitsCN.com】
http://www.bitscn.com/hack/safe/200607/47036.html
560 0
|
8天前
|
安全 关系型数据库 MySQL
Windows Server 安装 MySQL 8.0 详细指南
安装 MySQL 需要谨慎,特别注意安全配置和权限管理。根据实际业务需求调整配置,确保数据库的性能和安全。
50 9
|
2月前
|
网络安全 Windows
Windows server 2012R2系统安装远程桌面服务后无法多用户同时登录是什么原因?
【11月更文挑战第15天】本文介绍了在Windows Server 2012 R2中遇到的多用户无法同时登录远程桌面的问题及其解决方法,包括许可模式限制、组策略配置问题、远程桌面服务配置错误以及网络和防火墙问题四个方面的原因分析及对应的解决方案。
|
2月前
|
监控 安全 网络安全
使用EventLog Analyzer日志分析工具监测 Windows Server 安全威胁
Windows服务器面临多重威胁,包括勒索软件、DoS攻击、内部威胁、恶意软件感染、网络钓鱼、暴力破解、漏洞利用、Web应用攻击及配置错误等。这些威胁严重威胁服务器安全与业务连续性。EventLog Analyzer通过日志管理和威胁分析,有效检测并应对上述威胁,提升服务器安全性,确保服务稳定运行。