MF PasswordCracking WP Final 002
MF PasswordCracking WP Final 002
PASSWORD CRACKING
4 STEPS TO FORENSIC WINDOWS
PASSWORD CRACKING
In late 2016, Microsoft introduced a large anniversary update for Windows 10.
In addition to improvements such as a Linux shell, pure re-installation, improved
Cortana intelligence, new biometric login options based on Windows Hello, and
other features1 , Windows addressed a vulnerability that allowed malicious users
to deploy a certain form of ransomware.
More specifically, Microsoft changed the standard Windows 10 login workflow, as
well as the location where the password hash is stored. While the hash is still stored
in the Security Account Manager (SAM) hive, the offset within the key has changed,
so the use of most hacker tools specifically designed to pull this data will not work.
To counteract the impact to digital forensics examiners, Magnet Forensics
developed a new, free tool. The AXIOM Wordlist Generator offers a repeatable
process for determining and retrieving user passwords based on keywords from
a Magnet AXIOM case file.
Why is doing it this way important? Humans are wired to complete tasks using
minimal effort. This includes the number of passwords we have to remember.2
Thus, the average individual might use the same password in multiple locations.
Even the more sophisticated, security-minded among us tend to rely on variations
of a single password, or other easy-to-remember password scheme.
Kaelin, Mark, “New security features make Windows 10 Anniversary Update a must,” TechRepublic, July 16, 2016,
1
https://www.techrepublic.com/article/new-security-features-make-windows-10-anniversary-update-a-must/
accessed January 11, 2018
2
Help Net Security, “The psychological reasons behind risky password practices,” September 29, 2016,
https://www.helpnetsecurity.com/2016/09/29/risky-password-practices/ accessed January 11, 2018
The hash is still stored in the SAM hive located in the following key:
HKLM/SAM/SAM/Domains/Account/Users/<<<RID>>> (000003E9 in this case)
in the “V” key, but the offset within that key has changed.
When you log into a computer with the Windows OS, Windows is not actually passing
the password you entered to compare against the stored password. Remember:
there is no stored password. Instead when you type in the password, Windows
converts it to the NTLM hash and requests the system decrypt the encrypted NTLM
hash from the SAM hive.5
Windows then compares the NTLM hash of the password you typed with the NLTM
that is unencrypted from the SAM hive using the AES algorithm stored in the
SYSTEM hive. If they match, you are allowed access. If they do not match, you are
not allowed access.
IT Pro Today editorial staff, “How Do I Use the SYSKEY Functionality of Service Pack 3?” IT Pro Today, September 12, 2000, http://www.itprotoday.com/
4
1. Obtain the SAM and SYTEM hives from the forensic image
Open the case file within Magnet AXIOM. Using the file system view, browse to the
Windows\System32\Config\ folder and highlight the SAM and SYSTEM registry
hives. Right-click on the highlighted files and choose the option “Save file/folder
to…”, to save the files to the desktop.
Rename those files to something that shows they are the extracted files; for example,
SYSTEM_e and SAM_e.
Once this is done, you can proceed with downloading MIMIKATZ. Find it at
https://github.com/gentilkiwi/mimikatz/releases and download. Then, extract
it to a folder on your desktop. Open an administrator command prompt by typing
CMD in the box on the bottom left of your desktop. Right-click on the resulting
CMD.exe when the search is complete, and choose “Run as administrator.”
Figure 4: MIMIKATZ program unencrypting the NTLM hash Figure 3: Administrator level command prompt
Focus on the user named “Instruct” as seen in Figure 5. This user has a RID of
000003e9, which is the hexadecimal representation of the decimal value of 1001.
Right-click in the command prompt and choose the option to “Mark” and then
highlight the NTLM hash of the Instruct user. When you have highlighted only the
hash “07d46719881c9357cfaf6a909f175717” right-click on it. This automatically
copies it to the clipboard. Open Notepad and paste the hash there. Then, save the file
to your desktop, naming it NTLM.txt.
After you have browsed to the folder containing your case file, choose the option to
browse to the location you want to save your wordlist. Then, save it to the desktop,
naming it “DICTIONARY.txt”. Click Start.
There is a “words added” indicator next to the start option, which grows incrementally
as words are populated into the DICTIONARY.txt file. When the list-building process
is complete, a pop-up will appear, indicating the wordlist was generated and the total
word count added from the number of cases selected.
In the hashcat folder is a file named hashcat.potfile. If the password was obtained,
it will be recorded in plain text in this file. Open hashcat.potfile in Notepad to see the
contents. The passwords are stored in the following format: “NTLM unencrypted
hash:password”
© 2018 Magnet Forensics Inc. All rights reserved. Magnet Forensics®, Internet Evidence Finder®, IEF®, Magnet™, AXIOM™,
Magnet.AI™, ACQUIRE™ and related trademarks, names and logos are the property of Magnet Forensics and are registered and/
or used in the U.S. and countries around the world. All other trademarks cited herein are the property of their respective owners.