Advertisement
Guest User

Guide

a guest
Jul 23rd, 2011
105
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.07 KB | None | 0 0
  1. 1 LM vs. NTLM
  2. 2 Syskey
  3. 3 Cracking Windows Passwords
  4. 3.1 Extracting the hashes from the Windows SAM
  5. 3.1.1 Using BackTrack Tools
  6. 3.1.1.1 Using bkhive and samdump v1.1.1 (BT2 and BT3)
  7. 3.1.1.2 Using samdump2 v2.0.1 (BT4)
  8. 3.1.1.3 Cached Credentials
  9. 3.1.2 Using Windows Tools
  10. 3.1.2.1 Using fgdump
  11. 3.1.2.2 Using gsecdump
  12. 3.1.2.3 Using pwdump7
  13. 3.1.2.4 Cached Credentials
  14. 3.2 Extracting the hashes from the Windows SAM remotely
  15. 3.2.1 Using BackTrack Tools
  16. 3.2.1.1 ettercap
  17. 3.2.2 Using Windows Tools
  18. 3.2.2.1 Using fgdump
  19. 3.3 Cracking Windows Passwords
  20. 3.3.1 Using BackTrack Tools
  21. 3.3.1.1 John the Ripper BT3 and BT4
  22. 3.3.1.1.1 Cracking the LM hash
  23. 3.3.1.1.2 Cracking the NTLM hash
  24. 3.3.1.1.3 Cracking the NTLM using the cracked LM hash
  25. 3.3.1.1.4 Cracking cached credentials
  26. 3.3.1.2 John the Ripper - current
  27. 3.3.1.2.1 Get and Compile
  28. 3.3.1.2.2 Cracking the LM hash
  29. 3.3.1.2.3 Cracking the LM hash using known letter(s) in known location(s) (knownforce)
  30. 3.3.1.2.4 Cracking the NTLM hash
  31. 3.3.1.2.5 Cracking the NTLM hash using the cracked LM hash (dumbforce)
  32. 3.3.1.2.6 Cracking cached credentials
  33. 3.3.1.3 Using MDCrack
  34. 3.3.1.3.1 Cracking the LM hash
  35. 3.3.1.3.2 Cracking the NTLM hash
  36. 3.3.1.3.3 Cracking the NTLM hash using the cracked LM hash
  37. 3.3.1.4 Using Ophcrack
  38. 3.3.1.4.1 Cracking the LM hash
  39. 3.3.1.4.2 Cracking the NTLM hash
  40. 3.3.1.4.3 Cracking the NTLM hash using the cracked LM hash
  41. 3.3.2 Using Windows Tools
  42. 3.3.2.1 John the Ripper
  43. 3.3.2.1.1 Cracking the LM hash
  44. 3.3.2.1.2 Cracking the NTLM hash
  45. 3.3.2.1.3 Cracking the NTLM hash using the cracked LM hash
  46. 3.3.2.1.4 Cracking cached credentials
  47. 3.3.2.2 Using MDCrack
  48. 3.3.2.2.1 Cracking the LM hash
  49. 3.3.2.2.2 Cracking the NTLM hash
  50. 3.3.2.2.3 Cracking the NTLM hash using the cracked LM hash
  51. 3.3.2.3 Using Ophcrack
  52. 3.3.2.3.1 Cracking the LM hash
  53. 3.3.2.3.2 Cracking the NTLM hash
  54. 3.3.2.3.3 Cracking the NTLM hash using the cracked LM hash
  55. 3.3.2.4 Using Cain and Abel
  56. 3.3.3 Using a Live CD
  57. 3.3.3.1 Ophcrack
  58. 4. Changing Windows Passwords
  59. 4.1 Changing Local User Passwords
  60. 4.1.1 Using BackTrack Tools
  61. 4.1.1.1 chntpw
  62. 4.1.2 Using a Live CD
  63. 4.1.2.1 chntpw
  64. 4.1.2.2 System Rescue CD
  65. 4.2 Changing Active Directory Passwords
  66. 5 plain-text.info
  67. 6 Cracking Novell NetWare Passwords
  68. 7 Cracking Linux/Unix Passwords
  69. 8 Cracking networking equipment passwords
  70. 8.1 Using BackTrack tools
  71. 8.1.1 Using Hydra
  72. 8.1.2 Using Xhydra
  73. 8.1.3 Using Medusa
  74. 8.1.4 Using John the Ripper to crack a Cisco hash
  75. 8.2 Using Windows tools
  76. 8.2.1 Using Brutus
  77. 9 Cracking Applications
  78. 9.1 Cracking Oracle 11g (sha1)
  79. 9.2 Cracking Oracle passwords over the wire
  80. 9.3 Cracking Office passwords
  81. 9.4 Cracking tar passwords
  82. 9.5 Cracking zip passwords
  83. 9.6 Cracking pdf passwords
  84. 10 Wordlists aka Dictionary attack
  85. 10.1 Using John the Ripper to generate a wordlist
  86. 10.2 Configuring John the Ripper to use a wordlist
  87. 10.3 Using crunch to generate a wordlist
  88. 10.4 Generate a wordlist from a textfile or website
  89. 10.5 Using premade wordlists
  90. 10.6 Other wordlist generators
  91. 10.7 Manipulating your wordlist
  92. 11 Rainbow Tables
  93. 11.1 What are they?
  94. 11.2 Generating your own
  95. 11.2.1 rcrack - obsolete but works
  96. 11.2.2 rcracki
  97. 11.2.3 rcracki - boinc client
  98. 11.2.4 Generating a rainbow table
  99. 11.3 WEP cracking
  100. 11.4 WPA-PSK
  101. 11.4.1 airolib
  102. 11.4.2 pyrit
  103. 12 Distributed Password cracking
  104. 12.1 john
  105. 12.2 medussa (not a typo this is not medusa)
  106. 13 using a GPU
  107. 13.1 cuda - nvidia
  108. 13.2 stream - ati
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement