0% found this document useful (0 votes)
27 views15 pages

Lab8 FRS301

Lab8_FRS301

Uploaded by

bibinmi1376
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
27 views15 pages

Lab8 FRS301

Lab8_FRS301

Uploaded by

bibinmi1376
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 15

Lab 8: Password Cracking of Windows Operating System.

Step 1.

Step 2: A Registry Editor file with SAM and SYSTEM folder


Step 3:
These SAM and SYSTEM files can be accessed by registry editor after giving
administrative permissions
Step 4:
Export the SAM file after giving the administrative permissions.

Step 5:
In a similar fashion, right click on the SYSTEM file and give administrative
permissions by allowing “Full Control” and “Read” after clicking the check
box
Step 6:
Export the SYSTEM file after giving the administrative permissions. Right
click on SYSTEM file and click “Export” .Save the file by giving file name as
“SYSTEM” and type as “Registry Hive Files”.

Step 7:
Download the “Mimikatz” tool by clicking the “mimikatz_trunk.zip” file from
GitHub website
Step 8:
After downloading the file, unzip the“mimikatz_trunk.zip” file. Now go to:
“C:/Downloads/mimikatz_trunk/x64/mimikatz” and left click twice on
mimikatz file

Step 9:
A command line prompt of Mimikatz tool will open
Step 11:
Type “lsadump::sam /system:C:\Users\NITTTR\Desktop\SYSTEM /SAM:C:\
Users\NITTTR\Desktop\SAM” command in command line prompt of
Mimikatz tool. Press Enter.
The command will show NTLM hash password of Windows operating system
Step 12
Open Kali Linux operating system

Step 13:
Step 14
Step 15:
Save and open the downloaded file. Open the “Real-Passwords” folder to
see the passwords wordlist
Step 17:
In Kali Linux operating system, open the hashcat tool. Go to Applications->
Password attacks-> hashcat

Step 18:
Step 19:
Step 20:

You might also like