Lab 8: Password Cracking of Windows Operating System.
Step 1.
Step 2: A Registry Editor file with SAM and SYSTEM folder
Step 3:
These SAM and SYSTEM files can be accessed by registry editor after giving
administrative permissions
Step 4:
Export the SAM file after giving the administrative permissions.
Step 5:
In a similar fashion, right click on the SYSTEM file and give administrative
permissions by allowing “Full Control” and “Read” after clicking the check
box
Step 6:
Export the SYSTEM file after giving the administrative permissions. Right
click on SYSTEM file and click “Export” .Save the file by giving file name as
“SYSTEM” and type as “Registry Hive Files”.
Step 7:
Download the “Mimikatz” tool by clicking the “mimikatz_trunk.zip” file from
GitHub website
Step 8:
After downloading the file, unzip the“mimikatz_trunk.zip” file. Now go to:
“C:/Downloads/mimikatz_trunk/x64/mimikatz” and left click twice on
mimikatz file
Step 9:
A command line prompt of Mimikatz tool will open
Step 11:
Type “lsadump::sam /system:C:\Users\NITTTR\Desktop\SYSTEM /SAM:C:\
Users\NITTTR\Desktop\SAM” command in command line prompt of
Mimikatz tool. Press Enter.
The command will show NTLM hash password of Windows operating system
Step 12
Open Kali Linux operating system
Step 13:
Step 14
Step 15:
Save and open the downloaded file. Open the “Real-Passwords” folder to
see the passwords wordlist
Step 17:
In Kali Linux operating system, open the hashcat tool. Go to Applications->
Password attacks-> hashcat
Step 18:
Step 19:
Step 20: