mirror of
https://github.com/mubix/kaliwiki.git
synced 2025-10-29 16:59:26 +00:00
Merge pull request #93 from pwnwiki/Menu-Password-Attacks
Menu password attacks
This commit is contained in:
commit
88716c2f0e
@ -9,13 +9,48 @@ GPU Tools
|
||||
Offline Attacks
|
||||
-----------
|
||||
|
||||
* [tool](../tools/_template.md)
|
||||
* [tool](../tools/_template.md)
|
||||
* [tool](../tools/_template.md)
|
||||
* [cachedump](../tools/cachedump.md)
|
||||
* [chntpw](../tools/chntpw.md)
|
||||
* [cmospwd](../tools/cmospwd.md)
|
||||
* [crunch](../tools/_template.md)
|
||||
* [dictstat](../tools/_template.md)
|
||||
* [fcrackzip](../tools/_template.md)
|
||||
* [hashcat](../tools/_template.md)
|
||||
* [hash-identifier](../tools/_template.md)
|
||||
* [john](../tools/_template.md)
|
||||
* [lsadump](../tools/_template.md)
|
||||
* [maskgen](../tools/_template.md)
|
||||
* [oclhashcat](../tools/oclhashcat.md)
|
||||
* [ophcrack](../tools/_template.md)
|
||||
* [ophcrack-cli](../tools/_template.md)
|
||||
* [policygen](../tools/_template.md)
|
||||
* [pwdump](../tools/_template.md)
|
||||
* [pyrit](../tools/pyrit.md)
|
||||
* [rainbowcrack](../tools/_template.md)
|
||||
* [rcracki_mt](../tools/_template.md)
|
||||
* [rsmangler](../tools/_template.md)
|
||||
* [samdump2](../tools/_template.md)
|
||||
* [sipcrack](../tools/_template.md)
|
||||
* [sucrack](../tools/_template.md)
|
||||
* [truecrack](../tools/_template.md)
|
||||
|
||||
|
||||
Online Attacks
|
||||
-----------
|
||||
|
||||
* [tool](../tools/_template.md)
|
||||
* [tool](../tools/_template.md)
|
||||
* [tool](../tools/_template.md)
|
||||
* [acccheck](../tools/acccheck)
|
||||
* [burpsuite](../tools/burpsuite.md)
|
||||
* [cewl](../tools/_template.md)
|
||||
* [cisco-auditing-tool](../tools/_template.md)
|
||||
* [dbpwaudit](../tools/dbpwaudit.md)
|
||||
* [findmyhash](../tools/_template.md)
|
||||
* [hydra](../tools/_template.md)
|
||||
* [hydra-gtk](../tools/_template.md)
|
||||
* [medusa](../tools/_template.md)
|
||||
* [ncrack](../tools/_template.md)
|
||||
* [onesixtyone](../tools/onesixtyone.md)
|
||||
* [owasp-zap](../tools/owasp-zap.md)
|
||||
* [patator](../tools/_template.md)
|
||||
* [phrasendrescher](../tools/_template.md)
|
||||
* [thc-pptp-bruter](../tools/_template.md)
|
||||
* [webscarab](../tools/webscarab.md)
|
||||
|
||||
19
tools/cachedump.md
Normal file
19
tools/cachedump.md
Normal file
@ -0,0 +1,19 @@
|
||||
# cachedump
|
||||
|
||||
Notes
|
||||
-------
|
||||
|
||||
|
||||
Help Text
|
||||
-------
|
||||
```
|
||||
usage: /usr/bin/cachedump <system hive> <security hive>
|
||||
```
|
||||
|
||||
Example Usage
|
||||
-------
|
||||
|
||||
|
||||
Links
|
||||
-------
|
||||
|
||||
@ -7,6 +7,100 @@ This manual page documents briefly the chntpw command. This manual page was wri
|
||||
chntpw is a utility to view some information and change user passwords in a Windows NT/2000 SAM userdatabase file, usually located at \WINDOWS\system32\config\SAM on the Windows file system. It is not necessary to
|
||||
know the old passwords to reset them. In addition it contains a simple registry editor (same size data writes) and hex-editor with which the information contained in a registry file can be browsed and modified.
|
||||
|
||||
|
||||
This little program will enable you to view some information and
|
||||
change user passwords, change user/group memberships
|
||||
in a Windows (NT/XP/Vista/win7/win8) etc SAM userdatabase file.
|
||||
You do not need to know the old passwords.
|
||||
However, you need to get at the registry files some way or another yourself.
|
||||
In addition it contains a simple registry editor with full write support,
|
||||
and hex-editor which enables you to
|
||||
fiddle around with bits&bytes in the file as you wish yourself.[1]
|
||||
|
||||
```
|
||||
chntpw: Program for interactively resetting passwords and group
|
||||
memberships.
|
||||
My boot CD runs this with options -i -L SAM
|
||||
|
||||
chntpw: change password of a user in a Windows SAM file,
|
||||
or invoke registry editor. Should handle both 32 and 64 bit windows and
|
||||
all version from NT3.x to Win8
|
||||
chntpw [OPTIONS] <samfile> [systemfile] [securityfile] [otherreghive] [...]
|
||||
-h This message
|
||||
-u <user> Username or RID (0x3e9 for example) to interactively edit
|
||||
-l list all users in SAM file and exit
|
||||
-i Interactive Menu system
|
||||
-f Interactively edit first admin user
|
||||
-e Registry editor. Now with full write support!
|
||||
-d Enter buffer debugger instead (hex editor),
|
||||
-v Be a little more verbose (for debuging)
|
||||
-L For scripts, write names of changed files to /tmp/changed
|
||||
-N No allocation mode. Only same length overwrites possible (very safe mode)
|
||||
-E No expand mode, do not expand hive file (safe mode)
|
||||
|
||||
|
||||
|
||||
-u <user> Username or RID (0x3e9 for example) to interactively edit
|
||||
|
||||
Invoke the interactive edit menu on specified user.
|
||||
Specifying a user name will most likely fail if user has international
|
||||
character, so better to use user ID (RID), for example
|
||||
chnptw -u 0x3e9 SAM
|
||||
to edit user with hexadecimal RID 3e9
|
||||
|
||||
|
||||
-l list all users in SAM file and exit
|
||||
|
||||
Just that, list users in human readable form, with some info about if
|
||||
user is admin and if password is set.
|
||||
|
||||
-i Interactive Menu system
|
||||
|
||||
Invokes the menu system. Menu items will vary a bit depending on what
|
||||
registry hives are loaded.
|
||||
|
||||
-f Interactively edit first admin user
|
||||
|
||||
Select first admin user for edit. This is user with lowest RID that
|
||||
also is member of administators group, or built-in user 0x1f4 if not
|
||||
others possible.
|
||||
|
||||
-e Registry editor. Now with full write support!
|
||||
|
||||
Enter the registry editor. It is a small command system. ? for help
|
||||
there. See other documentation for more on regedits.
|
||||
|
||||
-d Enter buffer debugger instead (hex editor),
|
||||
|
||||
Command line type hex editor, mostly for debugging purposes. ? for help.
|
||||
|
||||
-v Be a little more verbose (for debuging)
|
||||
|
||||
Lots of debug output during most operations (especially hive loading)
|
||||
|
||||
-L For scripts, write names of changed files to /tmp/changed
|
||||
|
||||
If any of the other functions changes the registry, the changed files
|
||||
are listed here. Can be used by wrapper scripts to know what to save.
|
||||
My boot CD uses it.
|
||||
|
||||
-N No allocation mode. Only same length overwrites possible (very safe mode)
|
||||
|
||||
Safe mode. Will only allow changes in registry that overwrites old
|
||||
values with same length data. Password reset only changes 2 bytes, and
|
||||
does not change value lenght, so password reset will still work in
|
||||
this safe mode. If something tries to violate this safe mode, a lot of
|
||||
error messages (some of the rather obscure) may occur.
|
||||
|
||||
-E No expand mode, do not expand hive file (safe mode)
|
||||
|
||||
Safe mode. Does not allow expanding the size of the file, but will
|
||||
allow adding keys/values as long as there is free space in the file
|
||||
already. (most files contains some free space)
|
||||
If expansion is needed but not allowed by this option,
|
||||
a lot of obscure error messages may occur, and file should not be saved.
|
||||
```
|
||||
|
||||
Help Text
|
||||
-------
|
||||
```
|
||||
@ -55,4 +149,4 @@ chntpw -u jabbathehutt SAM
|
||||
|
||||
Links
|
||||
-------
|
||||
|
||||
1. [pogostick.net](http://pogostick.net/~pnh/ntpasswd/)
|
||||
|
||||
48
tools/cmospwd.md
Normal file
48
tools/cmospwd.md
Normal file
@ -0,0 +1,48 @@
|
||||
# cmospwd
|
||||
|
||||
Notes
|
||||
-------
|
||||
CmosPwd decrypts password stored in cmos used to access BIOS SETUP.
|
||||
Works with the following BIOSes
|
||||
* ACER/IBM BIOS
|
||||
* AMI BIOS
|
||||
* AMI WinBIOS 2.5
|
||||
* Award 4.5x/4.6x/6.0
|
||||
* Compaq (1992)
|
||||
* Compaq (New version)
|
||||
* IBM (PS/2, Activa, Thinkpad)
|
||||
* Packard Bell
|
||||
* Phoenix 1.00.09.AC0 (1994), a486 1.03, 1.04, 1.10 A03, 4.05 rev 1.02.943, 4.06 rev 1.13.1107
|
||||
* Phoenix 4 release 6 (User)
|
||||
* Gateway Solo - Phoenix 4.0 release 6
|
||||
* Toshiba
|
||||
* Zenith AMI
|
||||
With CmosPwd, you can also backup, restore and erase/kill cmos.[1]
|
||||
|
||||
|
||||
Help Text
|
||||
-------
|
||||
```
|
||||
CmosPwd - BIOS Cracker 5.0, October 2007, Copyright 1996-2007
|
||||
GRENIER Christophe, grenier@cgsecurity.org
|
||||
http://www.cgsecurity.org/
|
||||
|
||||
Usage: cmospwd [/k[de|fr]] [/d]
|
||||
cmospwd [/k[de|fr]] [/d] /[wlr] cmos_backup_file write/load/restore
|
||||
cmospwd /k kill cmos
|
||||
cmospwd [/k[de|fr]] /m[01]* execute selected module
|
||||
|
||||
/kfr french AZERTY keyboard, /kde german QWERTZ keyboard
|
||||
/d to dump cmos
|
||||
/m0010011 to execute module 3,6 and 7
|
||||
|
||||
NB: For Award BIOS, passwords are differents than original, but work.
|
||||
|
||||
```
|
||||
|
||||
Example Usage
|
||||
-------
|
||||
|
||||
Links
|
||||
-------
|
||||
1. [cgsecurity](http://www.cgsecurity.org/wiki/CmosPwd)
|
||||
Loading…
x
Reference in New Issue
Block a user