EGL202 - Lab - 2 - Password Cracking (Student)
EGL202 - Lab - 2 - Password Cracking (Student)
EGL202 - Lab - 2 - Password Cracking (Student)
A. Introduction
Password cracking is one of the easiest and common ways hackers obtain unauthorized computer
or network access.
You will learn how to dump Windows Operating System (OS) password hashes. The password
hashes will enable the attacker to derive the actual passwords.
You will need administrator access to dump the contents of the Security Account Manager (SAM)
file on Windows machines. You will start with a simple SAM hash dump and run it with a hash
decryptor to uncover plain-text passwords. You will use the HACKER Virtual Machine (VM) for this
lab exercise.
2) Click “Play virtual machine” and if there is a warning prompt, click “I copied it” and this
will take you to the Hacker VM.
3) Start-> Run -> cmd. Open Command Prompt and locate the folder location of
pwdump7.exe. Type the folder location of pwdump7.exe. (eg. cd C:\Documents and
Settings\thehacker\Desktop\Password Cracking Tools\pwdump7).
5) Enter pwdump7.exe > c:\hashes.txt. This will copy all the data of pwdump7.exe to the
c:\hashes.txt file.
3) In the Choose Components window, uncheck all options and click Next.
3) Browse and select the hashes.txt file in C:\. Click Open. Hashes you had cracked
earlier are now loaded in Ophcrack.
6) The selected tables_vista_free is installed under the name Vista free, represented by
a green coloured button. Select the table and click OK.
In real time, if an attacker attempts to exploit a machine and escalate the privileges, the attacker
can obtain password hashes using tools like PWdump7. After which the attacker can use hash-
decoding tools like Ophcrack to acquire plain-text passwords.