Lab 8
Lab 8
Step 2: A Registry Editor file with SAM and SYSTEM folder will open as shown in
Figure 4.
The SAM and SYSTEM files are located in : “C:\Windows\System32\config” path
as shown in Figure 5.
Step 3:
These SAM and SYSTEM files can be accessed by registry editor after giving
administrative permissions. Right click on the SAM file as shown in Figure 6.
Then allow “Full Control” and “Read” by clicking the check box as shown in
Figure 7.
Step 4:
Export the SAM file after giving the administrative permissions. Right click on
the SAM file and click “Export” as shown in Figure 8. Save the file by giving
file name as “SAM” and type as “Registry Hive Files” as shown in Figure 9.
Step 5:
In a similar fashion, right click on the SYSTEM file and give administrative
permissions by allowing “Full Control” and “Read” after clicking the check
box as shown in Figure 10.
Step 6:
Export the SYSTEM file after giving the administrative permissions. Right
click on SYSTEM file and click “Export” as shown in Figure 11. Save the file
by giving file name as
“SYSTEM” and type as “Registry Hive Files” as shown in Figure 12.
Step 7:
Download the “Mimikatz” tool by clicking the “mimikatz_trunk.zip” file from
GitHub website as shown in Figure 13 and Figure 14
Step 8:
After downloading the file, unzip the“mimikatz_trunk.zip” file. Now go to:
“C:/Downloads/mimikatz_trunk/x64/mimikatz” and left click twice on
mimikatz file as shown in Figure 15.
Step 9:
A command line prompt of Mimikatz tool will open as shown in Figure 16.
Step 11:
Type “lsadump::sam /system:C:\Users\NITTTR\Desktop\SYSTEM /SAM:C:\
Users\NITTTR\Desktop\SAM” command in command line prompt of
Mimikatz tool. Press Enter.
The command will show NTLM hash password of Windows operating system
as shown in Figure 17
Step 12
Open Kali Linux operating system as shown in Figure 18.
Step 13:
Copy the NTLM hash (recovered with Mimikatz tool, refer Figure 17)
and store it in a file on Desktop as shown in Figure 19. Also, multiple
NTLM hash can be stored in a file to get plaintext as shown in Figure 20.
Step 14:
Search the password wordlist by browsing Google search engine as
shown in Figure 21. Open the GitHub website and download the ZIP file
as shown in Figure 22.
Step 15:
Save and open the downloaded file as shown in Figure 23. Open the
“Real-Passwords” folder to see the passwords wordlist as shown in
Figure 24
Step 16:
Open any password wordlist (e.g., Top12Thousandprobable-v2.txt file) as
shown in Figure 25. Copy the wordlist file on Desktop and rename as “pwdlist”
as shown in Figure 26.
Step 17:
In Kali Linux operating system, open the hashcat tool. Go to Applications->
Password attacks-> hashcat as shown in Figure 27.
Step 18:
A terminal with usage of hashcat tool will open as shown in Figure 28.
The tool states various hash modes which can be recovered as shown in
Figure 29 and Figure 30.
The NTLM hash has ID of 1000 as shown in Figure 29. The tool also
shows various attack modes as shown in Figure 30.
Step 20:
Write the command “hashcat –m 1000 –a 0 /root/Desktop/hash
/root/Desktop/pwdlist --force” to recover the hash and “hashcat –m 1000
–a 0 /root/Desktop/hash /root/Desktop/pwdlist --force --show” to display
the plaintext of NTLM hash as shown in Figure 33.
In this command, -m stands for hash mode (e.g., 1000 stands for NTLM
hash, refer Figure 30) and -a stands for attack mode (e.g., 0 stands for
straight attack, refer Figure 31). The26 path to the hash file and wordlist
file is also given in the
command. The plaintext of the NTLM hash is displayed in the Figure 33
and highlighted in red rectangular box. The plaintext of the NTLM hash
is “password123”.