Application Password Checkers Cain Application Password Cracker Lab

FacebookTwitterGoogle+LinkedInEmail
Description
[toggle_content title="Transcript"] Hey, Leo Dregier here. I want to talk about one of my favorite tools and has been for quite some time. Um, I love covering Cain and Abel who are commonly known as Cain as one of the most popular tools in the ethical hacking community. So, what I want to show is a specific feature of how to basically import, uh, local hashes from a system using a tool like this. So you’re going to go down to the Crackers menu here and then click on LM Hashes and then inside this dialog box right here to get the blue plus sign. This is going to be important. Everything comes from here. You have a button here that says Import Hashes from the local system or from a text file. Like, let’s says you use PWDump and you copy that to a text file and you want to import it from an actual text file versus a local system or import the hashes from a specific, uh, SAM database and you can locate that wherever you have it stored. I’m just going to go use the local system here. Alright, what you can see is this is where the administrator, uh, guests and owner or anything that is in the, um, SAM file is going to get dumped. Uh, in this case it’s kind enough to tell me that I have an empty password right away. Uh, so, what I want to prove here, specifically with an empty password while we capitalize on an opportunity is the second half of the LM Hash. Please note that this ends in EE. It’s actually commonly referred to as 404EE, alright. The second half of this is basically an encrypted version of Null specifically. Um, oh, I’m sorry. It’s – the algorithm is, uh, MD4 specifically with LAN manager and with NTLM it’s MD5 that is used specifically so they’re going to differ if you compare the two. Nonetheless, what you can do is you can copy these and you can search for these specific, exact specific combinations of letters on the Internet and they, and pretty much anything on the Internet will come back and also say, yes, that’s what that means is empty. So, it’s very commonly, uh, verifiable, okay. Um, so that’s how you would, uh, get the SAM database and then you can use your application crackers to go and try to break what these specific numbers are. In this case, a simple Google search would reveal what the password or lack thereof is, um, but either that’s where you start doing dictionary attacks and brute force attacks and rainbow tables and things like that to try to match specific hashes, uh, of the various types. But first you have to get them and that’s where this comes in. This is Cain and Abel. Um, now, the power in this is not only does it do Windows hashes, um, but look at all of the additional types of hashes or hashes which you can try to crack. So NTLM2, you can do the same thing, you can import. You have PWL files, it does Cisco IOS devices, it also does PIX-MD5 hashes, um, Open Shortest Path First and RIP, um, may it rest in peace, MD2, 4, and 5, SHA-1 and 2, RIPE for those of you that like to count integrity algorithms. In the CISSP classes, you know, we teach this module of, you know, how do you remember, you know, all of the integrity algorithms or the common ones and we go to the Internet and we search for online, um, uh, password generator, and, I’m sorry, integrity generator or calculator, and you can take some data and you can run through it and it will produce all of the possible hashes as an output or put it in the discussion and I’ll follow up with that thought there. Uh, but nonetheless, that only shows about ten different of the most popular. This shows a lot more than ten. This goes into specifics of MD2-5, RIPE, Kerberos, RADIUS even, different types of databases like MSSQL, MYSQL, Oracle. It even does Voice-Over IP if you can listen and sniff and use this in sniffing mode and sniff Voice-Over IP, um, uh, conversations, check out this feature right here. It also does wireless, uh, sniffing as well. Um, as a matter of fact, when you install this application you have to, it will prompt you for, do you have the most latest and greatest version of WINPCap, right, that’s the utility which allows us to sniff traffic and these things will get populated. Um, and then, you know, the really, really novelty features that does RSA SecurID Tokens and calculators here to try to predict sequence numbers, remote desktop terminals, um, and here your CISCO and, uh, you do have a handful of shortcuts right up on top here. So, that covers application cracking pretty much in its fullest because of all of the different variety of things that you can crack and how you can import them and export them out of a program like this. My name is Leo Dreiger. Thank you for watching and I’ll see you in the next video. [/toggle_content] Welcome to Module 14 of the Computer Hacking and Forensics course, Application Password Checkers. The Application Password Checkers module is a series of lab exploring the world of password cracking. We begin with hands on demonstrations Cain Application Password Cracker Lab Other labs you’ll engage as part of the Application Password Checkers module include the following labs:
  • passwordPro Lab
  • SAM Inside Lab
  • ophcrack Lab
Cain Application Password Cracker Lab This lab begins with a key feature of the Cain Application, Import Hashes. You’ll learn how to navigate to the LM Hash feature and how to launch and configure to learn what it finds and why those specific algorithm elements are important and what that means. You’ll also learn everything there is to know about application tracking from all the additional Hashes it picks up, how to use them, to using it as a sniffing tool, and cracking secure ID tokens. You’ll come away having learned the variety of components you can crack and how to do it with Cain & Able!
Recommended Study Material
Learn on the go.
The app designed for the modern cyber security professional.
Get it on Google Play Get it on the App Store

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel