I published a sample Active Directory database file (ntds.dit) to practise hash extraction and password cracking. And I published several how-to blog posts.
Here is an overview:
Practice ntds.dit File Part 2: Extracting Hashes
Practice ntds.dit File Part 3: Password Cracking With hashcat – Wordlist
Practice ntds.dit File Part 4: Password Cracking With hashcat – Brute-force
Practice ntds.dit File Part 5: Password Cracking With hashcat – LM NTLM
Practice ntds.dit File Part 6: Password Cracking With John the Ripper – Wordlist
Practice ntds.dit File Part 7: Password Cracking With John the Ripper – Brute-force
Practice ntds.dit File Part 8: Password Cracking With John the Ripper – LM NTLM
Video: ntds.dit: Extract Hashes With secretsdump.py
Practice ntds.dit File Part 9: Extracting Password History Hashes
[…] Practice ntds.dit File Overview […]
Pingback by Overview of Content Published In July | Didier Stevens — Monday 1 August 2016 @ 0:01
[…] cracking Active Directory passwords as I explained in this series of blog posts, you can also crack the password […]
Pingback by Password History Analysis | Didier Stevens — Tuesday 28 February 2017 @ 0:00
[…] domain controllers have no local accounts. I think I learned this back when I made my “Practice ntds.dit File Overview” series of blog […]
Pingback by Quickpost: Windows Domain Controllers Have No Local Accounts — Saturday 28 March 2020 @ 6:00