`
blogfeifei
  • 浏览: 1206919 次
文章分类
社区版块
存档分类
最新评论

Dumping NTLM Hash’s from Windows with Fgdump.

 
阅读更多

With the release of the new Question-Defense online NTLM, MD5 and MD4 cracker I decide to write a quick how to on grabbing the hash’s from a windows system. In order for this to work you need at least one username and logon of a user with admin privileges. I may in the future write a article on how to escalate your privileges from a user to a admin, but for the sake of this article will assume you know at least one admin user log on.

The tool I am going to use is called fgdump and is available here . The are other tools called PWDump which achieve the same result but I really like fgdump so I use it for all my hash dumping needs. My target is going to be a Windows 2003 server, but this will work on XP, Vista and Windows 7.

The tool can just be run on the local machine with no arguments at all and will dump the hash’s to a log file:

1-20-2010-7-33-49-PM

Now this is pretty easy but what if you do not have physical access to the server?

We can use fgdump remotely which is the way I generally use it.

Lets run a quick scan of our target and make sure its up with the proper ports open for the connection:

1-20-2010-7-11-55-PM

Ok so we see if our server target is up.

I use a great many command line windows tool so I try to keep them all in the C:/tools directory and add it to the path. I also like to have my cygwin binaries in the path so I can have UNIX like commands in my windows terminal. Check this article if you are interested in doing that.

So lets run our tool. Its pretty much the same we just need to add a few arguments:

  1. -h the ip of the host
  2. -u the username
  3. -p the password

1-20-2010-7-13-48-PM

Once we hit enter and execute the fgdump.exe it will notify us if the command completed successfully or not:

1-20-2010-7-14-17-PM

As you can see we had a successful dump. This will be saved in a log file in pwdump format on the machine we ran the tool from.

Lets see what that looks like:

1-20-2010-7-15-12-PM

Now this is the part where most people get confused. Windows actually uses two kinds of hashing algorithms. The first is called LM which is old and obsolete and is actually turned of by default in Windows Vista and Windows 7. The second one is called NTLM which is the one we are currently interested in.

So at this point you are probably wondering what part of that gibberish is the actual NTLM hash.

Lets open it in notepad so we can get a better look:

1-20-2010-7-16-33-PM

So lets break down the fields:

Alex:1004:F5D023D8475D3F6E144E2E8ADEF09EFD:6E6212F9FAC92682C51BB68DDC4819D7:::

The fields are separated by colons. So the first field is clearly the username, the second field is the user id, the third field is the LM hash. On systems with LM disabled like Windows 7, this will be blank. The final field is the NTLM hash we are interested in. I have highlighted the correct section of the hash in the picture in order to be really clear on the subject.

Once you have the hash, just copy it to you clipboard and open up our online cracker and select a option and let Question-Defense’s servers do the hard work for you:

1-20-2010-7-18-36-PM

Once your job has been completed the results will be emailed to you. And not one ounce of CPU power on your local machine used. We also offer special rates for companies who are interested in auditing large lists of passwords to make sure their users are practicing secure password policies.

分享到:
评论

相关推荐

    阿呆系列PhotoshopCS6

    That doesn’t mean that you shouldn’t shoot with Nikon, or that you shouldn’tprint with HP or Canon. If that’s what you have, if it’s what you’re comfortable with, and if it fulfills your needs, ...

    MySQL 5.6 Reference Manual

    1.16. Fred Fish's Dbug Library License . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ....

    Debugging with GDB --2007年

    Debugging programs with multiple processes . . . . . . . . . . . . 23 23 24 25 26 26 27 28 28 31 ii 5 Debugging with GDB Stopping and Continuing . . . . . . . . . . . . . . . . . . 33 5.1 Breakpoints....

    Doctrine ORM for PHP.pdf

    Table of Contents Introduction....................................................................................................13 Code Examples.........................................................

    Oracle Core Essential Internals for DBAs and Developers ■ ■

    数据库DBA必备手册 Jonathan Lewis 大神力作 Chapter 1: Getting Started . . . ....................................................................................Oracle in Processes ..........................

    MyDAC7.6.11

    Bug with dump data from VIEW is fixed Bug with creating columns on setting the TableName property in TDALoader is fixed Bug with TMyDump.BackupQuery repeated call is fixed 7.5.9 05-Sep-12 Rad ...

    ZendFramework中文文档

    10.2.3. Fetching Results from a SELECT Statement 10.2.3.1. Fetching a Single Row from a Result Set 10.2.3.2. Fetching a Complete Result Set 10.2.3.3. Changing the Fetch Mode 10.2.3.4. Fetching a ...

    Winlicense v2.0.6.0

    * Advanced technology which prevents dumping from memory to disk. * Fully customizable protection options and dialogs. The main objective of WinLicense is to cover all current vulnerabilities in ...

    Oracle Core Essential Internals for DBAs and Developers.zip

    Oracle Core Essential Internals for DBAs and Developers.pdf Jonathan Lewis ...■Appendix: Dumping and Debugging .................................................................... 231

    EEUPDATE刷MAC工具 EEUPDATE v5.30.10.00

    Using: Intel (R) PRO Network Connections SDK v2.30.10 EEUPDATE v5.30.10.00 ...Intel (R) Confidential and not for general ... Programs RO words in EEPROM/SR with values taken from RO Module binary file.

    au3反编译源码

    stub found out the exact original version, downloaded the original from the AutoIT site archive and now compare the original stub aka AutoItSC.bin with your dumped one(or more in detail the .text ...

    Perl Debugged.pdf

    Table of Content Table of Content.........................................................................................................................i Copyright....................................

    LINQPad_Premium_5.36.03_Any_CPU 含破解

    For users that have reported very slow autocompletion when running on Windows 10 with 3 monitors, this should now be fixed. This build includes a workaround for a .NET security issue.

    dumping oracle block

    FROM v$session s, v$process pr, v$parameter pa, v$instance i WHERE s.username = user AND s.paddr = pr.addr AND pa.name='user_dump_dest'; ``` 查询结果将给出跟踪文件的完整路径和名称,然后可以在该文本...

    windows95系统程序设计大奥秘.pdf

    第1章 透視 Windows 95 本章溫習 Win32 作業系統(Windows NT、Win32s 和 Windows 95)的歷史背景。你可 以得知每㆒個作業系統的優點與弱點,以及其他 Win32 環境如 OS/2 Warp 和 Phar Lap 公司的 TNT DOS extender...

    UnidacPro8.0.1Rio.rar

    Unidac_Pro_v8.0.1 RAD Studio 10.3 Rio is supported Support of UPPER and LOWER functions for Unified SQL is added Bug with using the FieldOrigins property is fixed Bug with using the TrimFixedChar ...

    UnidacProv8.0.1Tokyo.rar

    Unidac_Pro_v8.0.1 RAD Studio 10.2 Tokyo is supported Support of UPPER and LOWER functions for Unified SQL is added Bug with using the FieldOrigins property is fixed Bug with using the TrimFixedChar ...

    iamer:将您的AWS IAM配置转储并加载到文本文件中

    IAMer IAMer转储并将您的AWS IAM...Dumping users... Dumping groups... Dumping policies... # Save it $ git commit $ git push 安装 pip install iamer 配置 IAMer使用因此您需要执行以下操作: export AWS_ACCES

    unidac 7.4.11 pro for RAD Studio 10.3

    Bug in TUniDump with dumping national characters when UseUnicode is True is fixed ASE data provider Bug with AssignConnect is fixed MongoDB data provider Bug with re-setting a query for the Query ...

Global site tag (gtag.js) - Google Analytics