Password Attacks

Password Attacks

Password attacks are techniques used to obtain, crack, or bypass authentication credentials. These methods are crucial for security assessments, penetration testing, and understanding defensive measures against unauthorized access.

Credential Hunting

Windows Credential Locations

Location
Description
Access Method

SAM Database

Stores local account hashes

reg save HKLM\SAM sam.save

LSASS Process

Contains in-memory credentials

Process dumping tools

NTDS.dit

Domain controller database with all domain password hashes

Volume Shadow Copy or Directory Service utilities

Credential Manager

Saved web/Windows credentials

cmdkey /list

Registry Credentials

AutoLogon, stored credentials

reg query HKLM /f password /t REG_SZ /s

Configuration Files

Application config files

Search for password patterns

Group Policy Preferences

Potential domain credentials

findstr /S /I cpassword \\\\sysvol\\*.xml

Linux Credential Locations

Location
Description
Access Method

/etc/shadow

Hashed user passwords

cat /etc/shadow

.bash_history

Command history may contain credentials

cat ~/.bash_history

SSH Keys

Private/public key pairs

ls -la ~/.ssh/

Configuration Files

App configs in /etc or home directories

grep -r "password" /etc/

Browser Data

Saved browser credentials

Access ~/.mozilla/ or similar

Cleartext Files

Notes, backup files with credentials

find / -name "*.txt" 2>/dev/null

Memory Dumps

Credentials in process memory

Memory analysis tools

Hash Extraction Techniques

Windows SAM Database

LSASS Memory Dumping

NTDS.dit from Domain Controllers

Linux /etc/shadow

Password Cracking

Hashcat

John the Ripper

Pass-the-Hash Attacks

Using Mimikatz (Windows)

Using Impacket (Linux)

CrackMapExec for PTH

Kerberos Attacks

Kerberoasting

AS-REP Roasting

Golden Ticket Attack

Silver Ticket Attack

Password Spraying

Windows Internal Networks

Web Applications

Credential Reuse and Pivoting

Testing Credentials Across Network

Last updated