Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Computer System hacking, Study notes of Cybercrime, Cybersecurity and Data Privacy

The goal of system hacking is to gain access, escalate privileges, execute applications, and hide files. The objective of this lab is to help students learn to monitor a system remotely and to extract hidden files and other tasks that include: Extracting administrative passwords Hiding files and extracting hidden files Recovering passwords Monitoring a system remotely

Typology: Study notes

2022/2023

Available from 06/22/2024

rajendra-kumar-7
rajendra-kumar-7 🇮🇳

4 documents

1 / 344

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
Module 06: System Hacking
Objective
The goal of system hacking is to gain access, escalate privileges, execute applications,
and hide files.
The objective of this lab is to help students learn to monitor a system remotely and to
extract hidden files and other tasks that include:
Extracting administrative passwords
Hiding files and extracting hidden files
Recovering passwords
Monitoring a system remotely
Scenario
Password cracking is one of the crucial stages of system hacking. Hacking often begins
with password cracking attempts. A password is a key piece of information necessary to
access a system. Consequently, most attackers use password cracking techniques to
gain unauthorized access. An attacker may either crack a password manually by
guessing it, or use automated tools and techniques such as a dictionary or a brute-force
method. Most password cracking techniques are successful because of weak or easily
guessable passwords.
The labs in this module demonstrate just how easily hackers can gather password
information from your network, and describe password vulnerabilities that exist in
computer networks, as well as countermeasures to help prevent these vulnerabilities
from being exploited on your systems.
Exercise 1: Dumping and Cracking SAM Hashes to
Extract Plaintext Passwords
The Security Account Manager (SAM) is a database file present on Windows machines
that stores user accounts and security descriptors for users on a local computer. It
stores users' passwords in a hashed format (in LM hash and NTLM hash). Because a
hash function is one-way, this provides some measure of security for the storage of the
passwords.
pf3
pf4
pf5
pf8
pf9
pfa
pfd
pfe
pff
pf12
pf13
pf14
pf15
pf16
pf17
pf18
pf19
pf1a
pf1b
pf1c
pf1d
pf1e
pf1f
pf20
pf21
pf22
pf23
pf24
pf25
pf26
pf27
pf28
pf29
pf2a
pf2b
pf2c
pf2d
pf2e
pf2f
pf30
pf31
pf32
pf33
pf34
pf35
pf36
pf37
pf38
pf39
pf3a
pf3b
pf3c
pf3d
pf3e
pf3f
pf40
pf41
pf42
pf43
pf44
pf45
pf46
pf47
pf48
pf49
pf4a
pf4b
pf4c
pf4d
pf4e
pf4f
pf50
pf51
pf52
pf53
pf54
pf55
pf56
pf57
pf58
pf59
pf5a
pf5b
pf5c
pf5d
pf5e
pf5f
pf60
pf61
pf62
pf63
pf64

Partial preview of the text

Download Computer System hacking and more Study notes Cybercrime, Cybersecurity and Data Privacy in PDF only on Docsity!

Module 06: System Hacking

Objective

The goal of system hacking is to gain access, escalate privileges, execute applications, and hide files. The objective of this lab is to help students learn to monitor a system remotely and to extract hidden files and other tasks that include: ● Extracting administrative passwords ● Hiding files and extracting hidden files ● Recovering passwords ● Monitoring a system remotely

Scenario

Password cracking is one of the crucial stages of system hacking. Hacking often begins with password cracking attempts. A password is a key piece of information necessary to access a system. Consequently, most attackers use password cracking techniques to gain unauthorized access. An attacker may either crack a password manually by guessing it, or use automated tools and techniques such as a dictionary or a brute-force method. Most password cracking techniques are successful because of weak or easily guessable passwords. The labs in this module demonstrate just how easily hackers can gather password information from your network, and describe password vulnerabilities that exist in computer networks, as well as countermeasures to help prevent these vulnerabilities from being exploited on your systems.

Exercise 1: Dumping and Cracking SAM Hashes to

Extract Plaintext Passwords

The Security Account Manager (SAM) is a database file present on Windows machines that stores user accounts and security descriptors for users on a local computer. It stores users' passwords in a hashed format (in LM hash and NTLM hash). Because a hash function is one-way, this provides some measure of security for the storage of the passwords.

In a system hacking life cycle, attackers generally dump operating system password hashes immediately after a compromise of the target machine. The password hashes enable attackers to launch a variety of attacks on the system, including password cracking, pass the hash, unauthorized access of other systems using the same passwords, password analysis, and pattern recognition, in order to crack other passwords in the target environment.. You need to have administrator access to dump the contents of the SAM file. Assessment of password strength is a critical milestone during your security assessment engagement. You will start your password assessment with a simple SAM hash dump and running it with a hash decryptor to uncover plaintext passwords. Pwdump7 can also be used to dump protected files. You can always copy a used file by executing pwdump7.exe -d c:\lockedfile.dat backup-lockedfile.dat. Rainbow tables for LM hashes of alphanumeric passwords are provided for free by the developers. By default, Ophcrack is bundled with tables that allow it to crack passwords not longer than 14 characters using only alphanumeric characters. Rainbow tables for LM hashes of alphanumeric passwords are provided for free by the developers. By default, Ophcrack is bundled with tables that allow it to crack passwords not longer than 14 characters using only alphanumeric characters. The objective of this lab is to help students learn how to: ● Use the pwdump7 tool to extract password hashes ● Use the Ophcrack tool to crack the passwords and obtain plain text passwords Lab Duration : 10 Minutes

  1. Click Windows 10 and click Ctrl+Alt+Delete. Alternatively navigate to Commands ( Thunder icon) menu and click

click Type Password.

  1. To launch command prompt, click the Search-bar in the Taskbar and type cmd, right-click on the result and click Run as administrator.
  2. In the command prompt window, type wmic useraccount get name,sid and press Enter. The comamnd displays the User Account Names and their respective IDs.

the context menu.

  1. Paste this folder on the Desktop of Windows 10 and close the file explorer window. Right-click on the desktop and select Paste from the context menu

to paste the folder.

  1. Type PwDump7.exe and press Enter. You will be shown the password hashes of the user accounts in the command prompt window.
  2. To write the password hashes to a file, type PwDump7.exe > c:\hashes.txt and press Enter. This command writes the extracted

passwords to a hashes.txt file and saves it in the C:\ drive.

11.In the hashes.txt file, replace the box symbols before each user ID with its respective User Name as obtained in step 4.

12.Click File from the menu-bar and select Save As… to save the edited hashes.txt file.

If an Open File - Security Warning window appears click Run.

15.Ophcrack main window appears, click Load from the menu-bar and select PWDUMP file from the drop-down list.

17.The hashes are loaded in the application, click Tables from the menu-bar.

  1. Table Selection window appears, select Vista free in the list and click Install. 19.The Select the directory which contains the tables window appears. Select the tables_vista_free folder, which is already placed in the following location Z:\CEHv10 Module 06 System Hacking\Password Cracking