Re: How does the Cain and Abel SAM dump works?
- From: Rob Thompson <my.security.lists@xxxxxxxxx>
- Date: Thu, 17 Jul 2008 19:50:39 -0700
-----BEGIN PGP SIGNED MESSAGE-----
Carlos Madrid wrote:
Some advice.. only try to crack the LM hashes. They won't be longer
then 14 chars.
It's even better than that. You're cracking two seven character hashes.
For a total of fourteen. It's faster to crack two seven character
passwords, than it is to crack one fourteen character pass.
Lan Manager should NEVER be run in production.
Also read a little bit for more info:
The hashes are best retrieved with dll injection into lsass.
Random link to save me typing:
On Mon, Jul 14, 2008 at 3:54 AM, Vikas Singhal
Nowaday, I am studying on the Topic - Cracking Windows password.
There are lot of tools out there which can dump LM and NTLM hashes for
you. But as far i know, you can't touch the SAM file when windows is
running, so, how does these tools work.
Is the sam dumped in-memory?
| _ |
| ASCII ribbon campaign ( ) |
| - against HTML email X |
| / \ |
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Ignorance is bliss...
-----END PGP SIGNATURE-----
- Prev by Date: Re: password protect pen drive
- Next by Date: Re: GIAC certification question
- Previous by thread: Re: How does the Cain and Abel SAM dump works?
- Next by thread: Re: How does the Cain and Abel SAM dump works?