ACTIVELabs
Powered by ACTIVECYBER, LLC
Powered by ACTIVECYBER, LLC
I was recently challenged to write a program to analyze a list of clear-text passwords and classify them into Hashcat-like masks, listing the top 3 most common masks used within the file and how many times they occurred. While researching password analysis and creating the program, I began to realize how useful this tool could be, not only for understanding the trends in password use but also its potential in penetration tests. For instance, say you’re able to gain access to the NTDS.dit file of a domain controller and crack a number of the NTLM hashes. With this program you could analyze the cracked passwords and output the most common masks in use, which you could then use in a mask attack with Hashcat to attempt to crack additional passwords. Or if you were to capture netNTLMv2 hashes with Responder and your password lists and rules files weren’t turning up anything, before turning to a brute-force attack you could obtain the organization’s password policy and target the most common masks that fit the password policy.
0 Comments
|
Archives
December 2023
ACTIVELabs was created in 2018 to hunt and research undiscovered vulnerabilities, report them to vendors via responsible disclosure programs, publish advisories, develop and validate new patches, and to share this information for the advancement of the cybersecurity community. ACTIVELabs was established with the mission of securing our ever-growing client base, partnerships, and the technology community as a whole.
We are actively providing the community with verified findings and research that leads to the creation of new Common Vulnerabilities and Exposures (CVEs) and updates to the National Vulnerability Database (NVD). For a full listing of all of our Advisories, visit our GitHub page here. |
©2022 ACTIVECYBER, LLC | All rights reserved | Privacy Policy
|