Password Hash cracking

We have successfully exploited a badblue server. Migrate the current process into lsass.exe

migrate -N lsass.exe

Dump NTLM hashes

Step 8: Verify that the hashes are stored in the MSF database or not.

Command:

Step 9: Use an auxiliary ntlm hash cracking module to crack stored NTLM hashes.

Commands:

Linux Hash cracking

We will start the postgresql database server on the attacker machine. We are starting postgresql to store all metasploit loot and other sensitive information from the target machine.

We have started postgresql database server. Start metasploit framework and exploit proftpd server using exploit/unix/ftp/proftpd_133c_backdoor module.

Make sure to replace LHOST with the IP address of the attacker machine.

We have exploited the target ftp server. We will use a post exploitation module to dump the system users hashes.

Run the provided auxiliary module to find the plain text password of the root user.

Last updated