Rakesh Softwares And Keys Information
  • Home
  • Business
    • Internet
    • Market
    • Stock
  • Parent Category
    • Child Category 1
      • Sub Child Category 1
      • Sub Child Category 2
      • Sub Child Category 3
    • Child Category 2
    • Child Category 3
    • Child Category 4
  • Featured
  • Health
    • Childcare
    • Doctors
  • Home
  • Business
    • Internet
    • Market
    • Stock
  • Downloads
    • Dvd
    • Games
    • Software
      • Office
  • Parent Category
    • Child Category 1
      • Sub Child Category 1
      • Sub Child Category 2
      • Sub Child Category 3
    • Child Category 2
    • Child Category 3
    • Child Category 4
  • Featured
  • Health
    • Childcare
    • Doctors
  • Uncategorized

Dumping Memory to Extract Password Hashes*

 dad     No comments   

Using Volatility (1.3_Beta), Volatility Plugin from Moyix, a test RAM Image (xp-laptop-
2005-06-25.img) and a Windows Hash/Password Finder (SamInside or Cain and Abel)
identify the passwords for the following users: Sarah, phoenix and the Administrator.
1. Run hivescan to get hive offsets
command: python volatility hivescan -f "C:\Dump\xp-laptop-2005-06-25.img"
Offset (hex)
42168328 0x2837008
42195808 0x283db60
47592824 0x2d63578
207677272 0xc60e758
207736840 0xc61d008
207759192 0xc622758
207822 ***** Truncated to save some space
2.Run hivelist with the first hivescan offset
command: python volatility hivelist -f "C:\Dump\xp-laptop-2005-06-25.img" -o
0x2837008
Address Name
0xe1ecd008 \Documents and Settings\Sarah\Local Settings\Application
Data\Microsoft\Windows\UsrClass.dat
0xe1eff758 \Documents and Settings\Sarah\NTUSER.DAT
0xe1bf9008 \Documents and Settings\LocalService\Local Settings\Application
Data\Microsoft\Windows\UsrClass.dat
0xe1c26850 \Documents and Settings\LocalService\NTUSER.DAT
0xe1bf1b60 \Documents and Settings\NetworkService\Local Settings\Application
Data\Microsoft\Windows\UsrClass.dat
0xe1c2a758 \Documents and Settings\NetworkService\NTUSER.DAT
0xe1982008 \WINDOWS\system32\config\software
0xe197f758 \WINDOWS\system32\config\default
0xe1986008 \WINDOWS\system32\config\SAM
0xe197a758 \WINDOWS\system32\config\SECURITY
0xe1558578 [no name]
0xe1035b60 \WINDOWS\system32\config\system0xe102e008 [no name]
3. Find Password Hash (-y System Hive Offset)(-s SAM Hive Offset) and Send to Text
File.
Command: volatility hashdump -f "C:\Dump\xp-laptop-2005-06-25.img" -y 0xe1035b60
-s 0xe1986008>Password_Hash.txt
Administrator:500:08f3a52bdd35f179c81667e9d738c5d9:ed88cccbc08d1c18bcded317112555f4:::
Guest:501:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
HelpAssistant:1000:ddd4c9c883a8ecb2078f88d729ba2e67:e78d693bc40f92a534197dc1d3a6d34f:::
SUPPORT_388945a0:1002:aad3b435b51404eeaad3b435b51404ee:8bfd47482583168a0ae5ab020e1186a9:
::
phoenix:1003:07b8418e83fad948aad3b435b51404ee:53905140b80b6d8cbe1ab5953f7c1c51:::
ASPNET:1004:2b5f618079400df84f9346ce3e830467:aef73a8bb65a0f01d9470fadc55a411c:::
Sarah:1006:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
4.Import Password_Hash.txt into a Password Finder (SamInside, Cain and Abel...).
User: Sarah Password: Empty
User: phoenix Password: Neon96
User: Administrator Password: Neon1996
Dumping memory with MDD
ManTech Memory DD (MDD) (http://www.mantech.com/msma/MDD.asp) is released
under GPL by Mantech International. MDD is capable of copying the complete contents
of memory on the following Microsoft Operating Systems: Windows 2000, Windows
XP, Windows 2003 Server, Windows 2008 Server.
After downloading MDD from the Mantech site you need to run the program at the
command line.
MDD Command Line Usage:
mdd -o OUTPUTFILENAME
Example:
C:\tools\mdd> mdd -o memory.dd
-> mdd
-> ManTech Physical Memory Dump Utility
Copyright (C) 2008 ManTech Security & Mission Assurance
-> This program comes with ABSOLUTELY NO WARRANTY; for details use
option `-w'This is free software, and you are welcome to redistribute it
under certain conditions; use option `-c' for details.
-> Dumping 255.48 MB of physical memory to file 'memory.dd'.
65404 map operations succeeded (1.00)
0 map operations failed
took 21 seconds to write
MD5 is: a48986bb0558498684414e9399ca19fc
The output file is commonly referred to as an "image" . MDD function is limited to
copying physical memory, so you will have to utilize another tool to analyze the memory
image.
  • Share This:  
  •  Facebook
  •  Twitter
  •  Google+
  •  Stumble
  •  Digg
Email ThisBlogThis!Share to XShare to Facebook
Newer Post Older Post Home

0 comments:

Post a Comment

Yes

Earing

Popular Posts

  • Aliens drive me crazy
    Game description: Aliens drive me crazy - a fascinating adventure where you will resist to the aliens who have attacked our planet. Game ...
  • Banner Grabbing
    Banner grabbing is an attack designed to deduce the brand and/or version of an operating system or application. Mean after port scanning we...
  • MINI MILITIA PRO PACK MOD + Unlimited Jetpack Mod FOR NON ROOTED USERS Version 2.2.52 Mega Mod Released
    MINI MILITIA PRO PACK MOD + Unlimited Jetpack Mod FOR NON ROOTED USERS Version 2.2.52 Mega Mod Released MOD INFORMATION:  -P...
  • WINDOWS HACKING
    1. How to Hide File & Folder Super Hidden. 2. Change any folder to Recycle Bin (for data security). 3. Registry Editor Tweaks for fu...
  • Chennai Express 1280x768 Pixel Full HD Full High Speed
    Chennai Express is a 2013 Indian romantic action comedy film directed by Rohit Shetty and produced by Gauri Khan under the banner Red Ch...
  • Altos
    Website.-- altosindia.net OUR HISTORY 2000- 18 Altos Started with Just 7 Products 2001- Awarded with "Pride of country" awar...
  • Youngistaan (2014) DVDRip [3GP Mp4 HD Avi] Bollywood Movie
    Click Here To Download Full Youngistaan-2014-Hindi Movie Movie: Youngistaan (2014) DVDRip   Category: Bollywood Movies ...
  • The Ghazi Attack Full Movie Download Free in 720p DVDRip Hindi
    Click here To Download                                                 
  • Ayurveda..What Is Ayurveda?
    Ayurvedic medicine (“Ayurveda” for short) is one of the world's oldest holistic (“whole-body”) healing systems. It was developed mo...
  • Want Money On 2 Hrs Working Only Then This Is For U.
    Want Money For Working 2hrs in a day,   Yes This Is Possible . I will Give You All The Information Just , CaLL Me . 7008083464 U CAn CA...

Recent Posts

Categories

  • .mp4
  • 7205173109 Contact Me.
  • Altos
  • Awesome Editing
  • Ayurveda
  • Clean
  • Colourfull
  • Dreams Comes True
  • Dust Clear
  • Edit
  • Editing
  • Fastival
  • forgot Chemical product
  • Games
  • hacked
  • Healthy
  • Hots
  • join ayurveda
  • Kanha
  • Krisha
  • Krishna Ji
  • Lala
  • Love
  • make mobile GoodLooks
  • ME
  • Movies
  • NATURAL BEAUTY
  • NATURE
  • network marketing
  • nice
  • Photo
  • PHOTOGRAPHY
  • Rakhi
  • RakshaBandhan
  • salesman
  • Software Keys
  • Softwares
  • tips
  • Trade Fastival
  • Tv
  • use altos product
  • use ayurvedic Product
  • WALLPAPER
  • wealthy

Unordered List

Pages

  • Home

Text Widget

Blog Archive

You Are The Visitor Number

Search For More

Rakesh, . Powered by Blogger.

Labels

  • Altos (3)
  • Awesome Editing (1)
  • Ayurveda (3)
  • Editing (1)
  • Games (1)
  • Movies (14)
  • Photo (1)
  • Software Keys (3)

Facebook

About Me

dad
View my complete profile

Home Recent Posts Display

Followers

Sample Text

Copyright © Rakesh Softwares And Keys Information | Powered by Blogger
Design by Hardeep Asrani | Blogger Theme by NewBloggerThemes.com