Cracking
MITRE ATT&CK™ Sub-technique T1110.002
Last updated
Was this helpful?
MITRE ATT&CK™ Sub-technique T1110.002
Last updated
Was this helpful?
Attacking Active Directory domains often leads to obtaining password interesting, but either hashed or encrypted data. When this information cannot be directly leveraged for higher privileges (like with pass-the-hash, ), it is required to crack it.
Cracking is an operation that can be carried out through different types of attacks:
Brute-force: every possibility for a given character set and a given length (i.e. aaa
, aab
, aac
, ...) is hashed and compared against the target hash.
Dictionary: every word of a given list (a.k.a. dictionary) is hashed and compared against the target hash.
Rainbow tables: the hash is looked for in a pre-computed table. It is a that allows cracking hashes faster, but costing a greater amount of memory than traditional brute-force of dictionary attacks. This attack cannot work if the hashed value is salted (i.e. hashed with an additional random value as prefix/suffix, making the pre-computed table irrelevant)
There are many other and more complex types of attacks (incremental, mask, rules, hybrid types, ...) but the major/core ones are the three above.
One of the greatest tools that can be used for cracking is (C). It implements different types of attacks and many types of hashes. It has many other great features like
it is cross-platform (support for Linux, Windows and macOS) and supports anything that comes with an OpenCL runtime (CPU, GPU, APU, ...)
it can crack multiple hashes at the same time and use multiple devices at once (distributed cracking networks supported too)
it can save and restore sessions
it has a builtin benchmarking system
Below is a short list of the most useful hash types for Active Directory hunting.
Hash type
-m/--hash-type
number
LM hash
3000
NT hash
1000
5500
5600
1100
2100
7500
18200
13100
Below is an example of how to use hashcat for a dictionary attack.
Hashcat has the ability to inject the plain passwords cracked into the dictionary and start the attack again, and this recursively until no new passwords are found. This can be done with the --loopback
argument.
Nota bene: the new passwords are added to dictionnary caches that will be temporary and deleted after the bruteforce+rules+loopack attack ends.
Hashcat can also be used in a hybrid mode by combining a dictionary attack with rules that will operate transformations to the words of the list.
TL; DR: here is a hashcat command that bruteforces any password from 4 to 8 characters long. Each character can be any printable character.
Hashcat has the following built-in charsets that can be used.
Below are examples of hashcat being used with built-in charset.
Hashcat can also be started with custom charsets in the following manner.
Hashcat also has an incremental feature that allows to bruteforce passwords up to a certain length whereas the commands above only try the specified mask's length.
Testers that manage to pwn a domain admin or a distributed local admin should try to operate multiple LSASS dumps to create a custom wordlist for a dictionary attack
Great wordlists: ,
Great rules: ,
More information on how to fully use hashcat can be found .
A robust alternative to hashcat is , a.k.a. john (C). It handles some hash types that hashcat doesn't (Domain Cached Credentials for instance) but it also has a strong community that regularly releases tools in the form of "something2john" that convert things to a john crackable format (e.g. bitlocker2john
, 1password2john
, keepass2john
, lastpass2john
and so on).
Google offers services like and that can be used for "cloud cracking". There are projects like , and that can help testers to setup a cracking session on such resources
Other solutions, cloud-based or not, can be used to improve cracking speed: for instance.
LM and NTLM ChallengeResponses can be cracked really fast (and for free depending on the hash) on , a remote service that cracks the hash with rainbow tables ().
Cracking LM and NT hash can be optimized by following .