Defense

If you know me that one of the first things, I recommend organisations do is conduct password audits against active directory on a regular basis. There are a ton of ways to do this and depending upon size of directory and budget you will likely want to do this with more than a CPU however the process remains the same. So, with the news that a new release of L0phtcrack (open source) is online let’s take a look at how we can deploy and start cracking those hashes! This isn’t an end to end guide to cracking with l0phtcrack – but it does show the install process and provide considerations for your cracking adventures. Remember, only do this where you have authorisation.

Getting Started

Ok so we need to download the binaries (this is a Windows tool) from: https://gitlab.com/l0phtcrack/l0phtcrack.gitlab.io/-/tree/main/public/releases/7.2.0

Once we have setup downloaded, from an elevated position let’s open the setup executable.

A screenshot of a computer

Description automatically generated with medium confidence

Graphical user interface, application

Description automatically generated

Graphical user interface, text, application, email

Description automatically generated

Graphical user interface, text, application

Description automatically generated

Graphical user interface, text, application, email

Description automatically generated

Click INSTALL

Graphical user interface, text, application

Description automatically generated

Graphical user interface, application

Description automatically generated

Click FINISH

Cracking some hashes

On our first run we have the wizard appear.

Graphical user interface, application

Description automatically generated

Let’s launch the wizard

Text

Description automatically generated

Click NEXT

Graphical user interface, text

Description automatically generated

Now we can choose the target type:

Windows

or

UNIX-Like

We are going to audit a Windows machine.

Text

Description automatically generated

We can do this via a few means, from the local system, from a remote system (using a Windows Agent/Service) or from a password dump file.

Graphical user interface, text

Description automatically generated

We are going to audit the local system:

Graphical user interface, text

Description automatically generated

Since this is a demo we are going to use the Quick Password Audit feature.

Graphical user interface, text

Description automatically generated

Graphical user interface, text

Description automatically generated

Click NEXT

Text

Description automatically generated

Now the sessions will start:

Graphical user interface

Description automatically generated with low confidence

Once the hashes a cracking run will begin. One thing you will learn about hash cracking is that one attempt is generally never enough. You will want to try a range of approaches to wordlist generation and mangling/character substitution.

Considerations

Ok there are several things to consider:

  • You will need admin rights on the targets
  • You will need GPUs if you want to do this in anger
  • You may need to ensure antivirus exclusions are in place
  • You should consider the sensitive nature of the exercise and take appropriate measures to secure the data in transit and at rest.
  • You will want to ensure good controls are used to secure the outputs

Password Cracking Tips

Ok so there are a few wordlists included but let’s think about password cracking:

  • Define the objectives
    • You may have a time/resource constraint on cracking runs
    • You may want to identify specific and sensitive accounts e.g., service accounts and domain admins etc.
  • You may want to gain access to much bigger wordlists
  • You will want to mangle words (there are rules in L0phcrack to do this)
  • When you crack hashes feed the cleartext back into the process
  • Experiment with different approaches
  • Generate custom wordlists based on the target organisation, people and geography/cultures

References

https://twitter.com/dildog

https://twitter.com/L0phtCrackLLC

https://gitlab.com/l0phtcrack/l0phtcrack.gitlab.io/-/tree/main/public/releases/7.2.0

Leave a Reply