| |||||
| |||||
Search Irongeek.com:
Help Irongeek.com pay for bandwidth and research equipment: |
This is a class we gave for the
Kentuckiana ISSA on the the subject of password exploitation. The Password
Exploitation Class was put on as a charity event for the Matthew Shoemaker
Memorial Fund ( http://www.shoecon.org/ ).
The speakers were Dakykilla, Purehate_ and Irongeek.
http://www.question-defense.com/
Lots of password finding and crack topics were covered. Hashcat, OCLHashcat,
Cain, SAMDump2, Nir's Password Recovery Tools, Password Renew, Backtrack 4 R1,
UBCD4Win and much more.
My slides in PDF and
PPTX format. The class video has been split into three parts:
Part 2: The best single video out there for
showing Hashcat and OCLHashcat. Lots of info about using Hashcat/OCLHashcat,
its advantages, and the power of a video card to
boost cracking speed.
Part 3: Windows LM and NTLM hash cracking, Time Memory Tradeoffs,
SAM Cracking Prevention, Linux/Unix passwd and shadow files, Parts of a
*nix hash, Windows Cached Domain Credentials, Problems with Windows 7,
Cracking Creds Countered, Finding where Unknown Apps store passwords,
System Process Monitoring, RegFromApp, ProcessActivityView, Procmon
(Process Monitor), finding the hash type, Other Weird Vectors, Inverse
Bruteforce, Look in the logs for passwords, upcoming events.
15 most recent posts on Irongeek.com:
|
If you would like to republish one of the articles from this site on your
webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast