Jump to content
begood

Automatically steal SAM and SYSTEM Files using HashGrab

Recommended Posts

Posted

s3my0n submitted this video to us. According to his post - In this video I will demonstrate how to use hashgrab under BackTrack 4 Final. HashGrab automatically mounts any Windows partitions it finds, then it looks for SAM and SYSTEM files in system32's "config" folder, and if found, copies them to user specified directory.

Download: http://stashbox.org/857577/hashgrab.zip

You can contact him at rush4ck3r [] gmail [] com

Automatically steal SAM and SYSTEM Files using HashGrab Tutorial

Posted

Am luat programul hashdump cand eram in BT4 live CD si am aflat hashurile alea... acum vreau sa stiu daca e un program deja instalat pentru a decripta acele hashuri in BT4 ca sa nu am nevoie de conexiune la internet...

Posted
Am luat programul hashdump cand eram in BT4 live CD si am aflat hashurile alea... acum vreau sa stiu daca e un program deja instalat pentru a decripta acele hashuri in BT4 ca sa nu am nevoie de conexiune la internet...

ai hashuri LM si NTLM ? sau doar NTLM ?

in primul caz nu iti trebuie decat tabelele rainbow de la freerainbowtables.com + rcracki_mt de pe sourceforge + lm2ntlm de pe blog.distracted.nl

in al doilea caz iti trebuie tabelele NTLM (frt) + rcracki_mt

Posted

wow, mai bine raman la site-urile pentru decriptari, ca nu imi place sa am 11 giga doar cu un rainbow table ;)) mersi oricum pentru raspuns, o sa pun la bokmark ca nu se stie niciodata cand o sa am nevoie de asa ceva :)

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...