The Password Cracking Tools module provides you with the instruction and server hardware to develop your hands on skills in the below topics.
- Using Cain & Abel
- Run PWdump7
- Understand LM Hash
- Using ThreatFire
The following exam objectives are covered in this lab:
- FC0-U51: 3.1 Define basic security threats (Password cracking).
Exercise 1 - Using Cain & Abel
In this exercise, you will learn how to use Cain & Abel password cracking tool for Microsoft Windows. It can recover different kinds of passwords using methods like network packet sniffing, cracking various password hashes by using methods like brute force attacks and dictionary attacks.
Exercise 2 - Run PWdump7
PWdump7 is a command-based utility that can help you recover password hashes from local system as well as remote systems. You can dump the hashes in a txt file and then use tools such as Cain & Abel or John the Ripper to crack the hashes.
Exercise 3 - Understand LM Hash
LM hashes were stored in the SAM database with the older operating systems, such as Windows XP. However, from Windows Vista onwards, LM hashes were no longer stored. In the registry, the registry key, NoLMHash, prevented the storage of LM hashes in the SAM database.
If you have systems with Windows XP on your network, you can force disabling LM hashes storage in SAM database through the Group Policy.
Exercise 4 - Using ThreatFire
Rootkits are stealthy type of software with a malicious intent of hiding the existence of certain programs or processes from normal methods of detection and potentially allow privileged access or administrator rights to computer.
ThreatFire is a pre-emptive anti-spyware monitoring tool that protects your computer from malware before it spreads in your system. It performs real-time monitoring of your PC to check for unusual behaviour.
See the full benefits of our immersive learning experience with interactive courses and guided career paths.