Didier Stevens

Monday 25 July 2016

Practice ntds.dit File Overview

Filed under: Encryption — Didier Stevens @ 9:15

I published a sample Active Directory database file (ntds.dit) to practise hash extraction and password cracking. And I published several how-to blog posts.

Here is an overview:

Practice ntds.dit File Part 1

Practice ntds.dit File Part 2: Extracting Hashes

Practice ntds.dit File Part 3: Password Cracking With hashcat – Wordlist

Practice ntds.dit File Part 4: Password Cracking With hashcat – Brute-force

Practice ntds.dit File Part 5: Password Cracking With hashcat – LM NTLM

Practice ntds.dit File Part 6: Password Cracking With John the Ripper – Wordlist

Practice ntds.dit File Part 7: Password Cracking With John the Ripper – Brute-force

Practice ntds.dit File Part 8: Password Cracking With John the Ripper – LM NTLM

Video: ntds.dit: Extract Hashes With secretsdump.py

Practice ntds.dit File Part 9: Extracting Password History Hashes

 

3 Comments »

  1. […] Practice ntds.dit File Overview […]

    Pingback by Overview of Content Published In July | Didier Stevens — Monday 1 August 2016 @ 0:01

  2. […] cracking Active Directory passwords as I explained in this series of blog posts, you can also crack the password […]

    Pingback by Password History Analysis | Didier Stevens — Tuesday 28 February 2017 @ 0:00

  3. […] domain controllers have no local accounts. I think I learned this back when I made my “Practice ntds.dit File Overview” series of blog […]

    Pingback by Quickpost: Windows Domain Controllers Have No Local Accounts — Saturday 28 March 2020 @ 6:00


RSS feed for comments on this post. TrackBack URI

Leave a Reply (comments are moderated)

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Blog at WordPress.com.