19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

188<br />

Part III: Hacking Network Hosts<br />

Figure 10-2:<br />

Loading<br />

password<br />

hashes from<br />

a remote<br />

SAM database<br />

in<br />

ophcrack.<br />

3. Load the program by selecting the ophcrack icon from your Start<br />

menu.<br />

4. Click the Load button and select the type of test you want to run.<br />

In this example, shown in Figure 10-2, I’m connecting to a remote server<br />

called test1. This way, ophcrack will authenticate to the remote server<br />

using my locally logged-in username and run pwdump code to extract<br />

the password hashes from the server’s SAM database. You can also load<br />

hashes from the local machine or from hashes extracted during a previous<br />

pwdump session.<br />

The extracted password hash usernames will look similar to those<br />

shown in Figure 10-3.<br />

5. Click the Launch icon to begin the rainbow crack process.<br />

The process can take a little while depending on your computer’s speed.<br />

Three of the long, random passwords I created for my test accounts<br />

were cracked in just a couple of minutes, as shown in Figure 10-4. The<br />

only reason the fourth wasn’t cracked is because it had an exclamation<br />

point on the end and I was using ophcrack’s smaller “10k” alphanumeric<br />

character set that doesn’t test for extended characters. ophcrack has<br />

other options that test for extended characters, so even the more creative<br />

passwords can be cracked.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!