Windows - Local Password Cracking
Theory
Before we can crack passwords on a local machine, we first have to locate the password hash file.
In windows based systems, the hashes are stored in a special file called the Security Account Manager (SAM) file. On NT based windows systems including windows 2000 and above, the SAM file is located in the C:\Windows\System32\Config\
directory.
Microsoft has added some additional security features to help protect the SAM file:
The SAM file is actually locked when the OS boots up. This means that while the OS is running we do not have the ability to open or copy the SAM file. In addition to the lock, the entire SAM file is encrypted and not viewable.
Practical
Bypass Windows Restrictions
Because we have physical access to the system, the simplest way to bypass the windows proctections is to boot to an alternate OS like Kali and Parrot.
Mount the Local Hard Drive
Browse the C: drive
Extract Hashes
Dump hashes using samdump2
Extract key from the system file using bkhive
Crack Hashes using John
Steps to Perfrom on a Local Machine
Shut down the target machine
Boot the target to Kali or Parrot OS via a live CD or USB drive.
Mount the local hard drive
Use Samdump2 and extract the hashes
Use John to crack the passwords.
REFERENCES
Last updated