Author Topic: How do you use a password cracker practically?  (Read 1441 times)

0 Members and 1 Guest are viewing this topic.

Offline white_noise

  • Serf
  • *
  • Posts: 21
  • Cookies: -5
    • View Profile
How do you use a password cracker practically?
« on: February 25, 2015, 05:48:15 pm »
I was thinking about this the other day and I'm just interested whether I got it right.

Is it?
  • Get access to machine e.g. exploit
  • find password file
  • get password file off computer (ftp, tftp ?)
  • crack password file
That's just my guess, let me know if that's right  :)

Offline cyberdrifter

  • Knight
  • **
  • Posts: 176
  • Cookies: -90
    • View Profile
Re: How do you use a password cracker practically?
« Reply #1 on: February 25, 2015, 10:53:33 pm »
For offline password cracking (say acquiring a SAM or passwd file), yeah, that is the rudimentary basics of the process.


There are other nuances to the process of password cracking... for instance, will you be bruteforcing (going through every possible sequence of viable digits until reaching the actual passwords), what type of cypher is it? will you be using rainbow tables? do you have a password list based on a targeted user profile? Have you intercepted other passwords/data via other means such as: packetsniffing, spyware, RAT, phishing/general social engineering, or some other surveillance method that can help you make more educated guesses and thus speed up the process?


Often times users will ignorantly use the same password over and over, and if not, the second most common method is using permutations of existing passwords/phrases which aids in creating targeted password files. If the user opts for using a passwordmanager/generator, you have a different problem set, with potentially a very big payoff.


This can be a very simple or very involved process depending on what direction you take it. But yeah, for the basics, you have the general idea...




BTW, you need to post an introduction before posting on other locations within the forum.
« Last Edit: February 25, 2015, 10:59:08 pm by cyberdrifter »
.- / .-.. .. - - .-.. . / -... . - - . .-. --..-- / . ...- . .-. -.-- / -.. .- -.-- .-.-.-
Go ahead tubby, you clearly want/need those cookies more than me.  :P

Offline m0rph

  • The People's Champ
  • VIP
  • Peasant
  • *
  • Posts: 50
  • Cookies: 44
  • Master Debator
    • View Profile
    • unkn0wn
Re: How do you use a password cracker practically?
« Reply #2 on: February 26, 2015, 03:43:09 pm »
This probably isn't what you're looking for, but here you go: https://evilzone.org/tutorials/assumption-based-gpu-hash-cracking-theory/
The code is strong with this one.

Offline Pavornoc

  • /dev/null
  • *
  • Posts: 11
  • Cookies: -1
    • View Profile
Re: How do you use a password cracker practically?
« Reply #3 on: March 23, 2015, 01:26:46 am »
Where I work, I often have to access people's accounts on their company owned computers (like if they leave/are fired, or if I need to do work on the system in general).  In this case, I often will use password crackers to get me access to these accounts.  I sometimes just ask the person to write down their password, but honestly it's more fun for me to crack it (plus it's good practice, as I already have authorization to access these computers). 

So yes, while a lot of password crackers are used for less-than-legal means, they're actually very helpful for IT professionals, too. Hope this helped!

Offline shome

  • Peasant
  • *
  • Posts: 81
  • Cookies: 8
    • View Profile
Re: How do you use a password cracker practically?
« Reply #4 on: March 24, 2015, 03:01:27 am »
I was thinking about this the other day and I'm just interested whether I got it right.

Is it?
  • Get access to machine e.g. exploit
  • find password file
  • get password file off computer (ftp, tftp ?)
  • crack password file
That's just my guess, let me know if that's right  :)

I understand your question, but I think it can actually happen in no particular order. Someone mentioned offline cracking. For example, if you were to exploit a local or remote file inclusion vulnerability and dump the hashes off the web server, you would then in essence 'find password file', 'get password file', 'crack password file', THEN finally 'Get access to machine'. But that's just a different way of looking at it. Hope I helped a bit.