Skip to main content

Hack Windows Password

Using Ophcrack,You can crack account password of almost all the Windows till date,And since OphCrack is the fastest password cracking tool,it wont take more than 4-5 minutes to crack a password.So let's begin

What Do You Need ?

BackTrack 5 Live DVD.
Rainbow Files (i'll tell you what it is.)
Physical Access to victim PC.

So What-The-Hell is Rainbow Files ?

First thing that pops in mind when reading rainbow files is the collection of rainbows and unicorns flying,but no,Rainbow Files/Tables are basically huge sets of precomputed tables filled with hash values that are pre-matched to possible plaintext passwords. The Rainbow Tables essentially allow hackers to reverse the hashing function to determine what the plaintext password might be. It's possible for two different passwords to result in the same hash so it's not important to find out what the original password was, just as long as it has the same hash. The plaintext password may not even be the same password that was created by the user, but as long as the hash is matched, then it doesn't matter what the original password was.

So What Do I Need To Do ?

You need to download the rainbow tables matching to the OS Version of your victim PC,Get Them Here.You can download the smaller files because they will work,unless your victim is the Head of FBI who uses 28 letter long password.NOTE : the vista files will work for Windows 7 and Windows 8 too.

Everything is Downloaded and ready,Now -

Put the downloaded rainbow tables in a flash drive,and pick that BackTack 5 Live DVD too.

Let The Hack Begin -

Step 1 -
Boot the Victim PC with BackTrack Live DVD.

Step 2 -
Now Navigate To The Directory where windows password files are Stored.
WINDOWS/system32/config/

Step 3 -
Locate the Files "SAM" and "System",and copy them to a new folder on BackTrack desktop.

Step 4 -
Run The OphCrack tool in backtrack by : start->Backtrack->Privilege Escalation->Password Attack->offline Attacks-ophCrack GUI.

Step 5 -
Go to "Load" and select "Encrypted SAM" in ophcrack tool.Now it will ask you to select directory that contains SAM folder. Select the directory where you saved the SAM file (new folder on desktop).

Step 6 -
Target The Administrator Account,remove other account off the list (if any).





Step 7 -
Plug in the pen-drive/flash drive,Extract The Rainbow Tables to Desktop.

Step 8 -
Click on the Table button in ophcrack tool. Now it will ask you to selec the table. Select the files as required.Click OK after that.

Step 9 -
Now Hit the Crack Button,and wait for 3-4 minutes,You will have the key in your hands .

Comments

Popular posts from this blog

SQL Injection ,Hacking PHP 4.4 sites in seconds

Today I am going to teach you how to hack a certain type of websites with very least efforts. Websites with PHP  4.4 have a SQL injection vulnerability in them which makes their Admin control panel easily accessible,and in just few steps you will access the admin's account of that website. Remember,this tutorial is applicable on PHP 4.4 machines with Apache running in parallel with them. Also,since I will be hacking REAL websites,I will not be displaying their URL’s or else I will be sued!!!. Also this tutorial is only for educational purpose. Here we go!!! Step 1 – Search for them Yep,make a Google dork to find sites running Apache and PHP 4.4 . Its quite easy.You can do this by searching inurl:adminlogin . Step 2 – Scan them Start by scanning them using Nmap ,Do and intense scan and find the open ports. If you find port 2000 open,then you have almost got it. most websites running PHP4.4 have this port for admin login. Now just login using port 2000 ie - ...

Bellmanford Algorithm C++ Program

The  Bellman–Ford algorithm  is an  algorithm  that computes  shortest paths  from a single source  vertex  to all of the other vertices in a  weighted digraph . It is slower than  Dijkstra's algorithm  for the same problem, but more versatile, as it is capable of handling graphs in which some of the edge weights are negative numbers. Here is the Source Code: #include<iostream> #include<stdio.h> using namespace std; #include<conio.h> #define INFINITY 999 struct node {     int cost;     int value;     int from; }a[5]; void addEdge(int am[][5],int src,int dest,int cost) {      am[src][dest] = cost;      return; } void bell(int am[][5]) {     int i, j, k, c = 0, temp;     a[0].cost = 0;     a[0].from = 0;     a[0].value = 0;     for (i = 1; i < 5; i++)     { ...

Software Testing through Fuzzing

Fuzz testing or fuzzing is a software testing technique used to discover coding errors and security loopholes in software, operating systems or networks by inputting massive amounts of random data, called fuzz, to the system in an attempt to make it crash . Fuzzing is  often automated or semi-automated, that  involves providing invalid, unexpected, or random data to the inputs of a computer program. The program is then monitored for exceptions such as crashes, or failing built-in code assertions or for finding potential memory leaks. Fuzzing technique is commonly used to test for security problems in software or computer systems ans also used to discover coding errors and security loopholes in software, operating systems  or networks by inputting massive amounts of random data, called fuzz, to the system  in an attempt to make it crash. If a vulnerability is found, a tool called a fuzz tester (or fuzzer), indicates potential causes. There are two forms ...