Version 1.2 (Beta) of the pwdump6 software has been released.
There are three major changes from the previous version:
- Uses “random” named pipes (GUIDs) to allow concurrent copies of the client to run. This is predominately for the next version of fgdump, which will be multithreaded.
- Will turn off password histories if the requisite APIs are not available (there are instances in which this is the case) – pwdump will no longer simply refuse to grab the hashes that it can.
- Data is now encrypted over the named pipe using the Blowfish algorithm. More information on this is available on the website.
pwdump is a very useful tool for grabbing the password hashes directly from Windows (you do need Administrator access, so in some situations you need to escalate your priveleges first).
It is still useful though, as normally with Admin access on a Windows box you can’t get the SAM file as it’s locked by the OS, the only way normally is to boot using a Security LiveCD and save it to a USB drive or e-mail it to yourself.
You can grab the latest version of pwdump here.
Once you have the password hashes from the SAM file you can then crack them with your favourite password cracker (LCP, Cain & Abel etc), or even RainbowCrack and Rainbow Tables.
There is another version of pwdump called fgdump on the page which I might check out in the future.
backbone says
but what privileges do you have to have…because “we need” to use this tool to crack a password, not to regain it… priviledges like having access in program files? or something like that?
Darknet says
You need local admin priveleges on the machine to run pwdump, which you could get without actually having the admin password, or you could have escalated from a normal user privelege, then using this tool you can dump all the hashes from the SAM file, and crack them, thus gaining all the passwords (including the admins).
Privelege is run user level.
CS Shyam Sundar says
Unfortunately one of the Best LANMAN dumper i have encountered., works best.,