{"id":578,"date":"2019-03-03T17:01:08","date_gmt":"2019-03-03T22:01:08","guid":{"rendered":"https:\/\/www.ccrossan.com\/blog\/?p=578"},"modified":"2019-03-03T17:02:12","modified_gmt":"2019-03-03T22:02:12","slug":"windows-10-password-recovery","status":"publish","type":"post","link":"https:\/\/crossan007.dev\/blog\/windows\/windows-10-password-recovery\/","title":{"rendered":"Windows 10 Password Recovery"},"content":{"rendered":"\n<div class=\"twitter-share\"><a href=\"https:\/\/twitter.com\/intent\/tweet?via=crossan007\" class=\"twitter-share-button\">Tweet<\/a><\/div>\n<p><strong>DISCLAIMER: DO NOT EXECUTE THIS PROCESS WITHOUT EXPLICIT APPROVAL FROM THE SYSTEM OWNERS.\u00a0 I AM NOT ENDORSING OR APPROVING ANY ILLEGAL ACTIVITY WHICH COULD BE ACCOMPLISHED FOLLOWING THESE STEPS<\/strong><\/p>\n<p>An older friend forgot his computer password; asked me for help.<\/p>\n<p>I booted the machine, and saw an email address where the Windows 10 username normally would be;\u00a0 my first thought was &#8220;oh, great; this is a Microsoft Online\u00a0 joined computer, password recovery probably won&#8217;t happen&#8221;<\/p>\n<p>I did a little research, and found some evidence that suggests my seemingly outdated knowledge about passwords being stored in the SAM seems to still stand.\u00a0 However, Windows 10 Anniversary Update changed the encryption algorithm used on the SAM:\u00a0<a href=\"https:\/\/twitter.com\/gentilkiwi\/status\/762465220132384770\">https:\/\/twitter.com\/gentilkiwi\/status\/762465220132384770<\/a><\/p>\n<p>This algorithm change broke my normal tool (OPHCRACK), since it was unable to read the NTLM hashes from the SAM.\u00a0 SAM encryption caused OPHCRACK to incorrectly read every account hash as <code> 31d6cfe0d16ae931b73c59d7e0c089c0<\/code>.\u00a0 So, I copied the SAM and SYSTEM files (at C:\\Windows\\System32\\config) from the target machine to my desktop for additional processing.<\/p>\n<p><a href=\"https:\/\/github.com\/gentilkiwi\/mimikatz\/releases\">Mimikatz <\/a>has a module `lsadump::sam` which accepts parameters for offline SYSTEM and SAM decryption.\u00a0 Easy command line:<\/p>\n<pre class=\"brush: plain; title: ; notranslate\" title=\"\">lsadump::sam \/system:c:\\users\\charles\\documents\\system \/sam:c:\\users\\charles\\documents\\sam<\/pre>\n<p>This returned decrypted NTLM hashes for easy cracking.<\/p>\n<p>I decided to try a new tool here to crack the plain text password from the NTLM hashes: <a href=\"https:\/\/hashcat.net\/hashcat\/\">Hashcat<\/a>.\u00a0 There&#8217;s a Windows 64bit compiled version (I know, I know don&#8217;t run random binaries&#8230;) which made it easy to get cracking quickly.<\/p>\n<p>I copied the hash from the output of Mimikaz into a text file called <code>hashes.txt<\/code>\u00a0and ran the command<\/p>\n<pre class=\"brush: plain; title: ; notranslate\" title=\"\">.\\hashcat64.exe -m 1000 -a 3 -O -o pass1.txt .\\hashes.hash<\/pre>\n<p>My 10 year old computer cracked the Microsoft Online account NTLM Windows 10 password hash in ~8 minutes. It was two dictionary words and a two-digit number for a total of 8 characters.\u00a0 I was using brute-force in this scenario, so the fact that dictionary words were used is of no consequence.\u00a0 Had I been using a dictionary, the attack would have likely concluded sooner.<\/p>\n<p>Just for fun, I generated a new NTLM hash, but replacing vowels with numbers (<code>i<\/code>\u00a0with <code>1<\/code>\u00a0and the <code>e<\/code>\u00a0with <code>3<\/code>\u00a0and so fourth), the attack took the same amount of time.<\/p>\n<pre class=\"brush: plain; title: ; notranslate\" title=\"\">\r\n\r\nimport hashlib\r\nprint hashlib.new('MD4', 'password'.encode('utf-16le')).hexdigest()\r\n\r\n<\/pre>\n<h4>Moral of the story:\u00a0 USE STRONG PASSWORDS AND A PASSWORD MANAGER<\/h4>\n","protected":false},"excerpt":{"rendered":"<p>DISCLAIMER: DO NOT EXECUTE THIS PROCESS WITHOUT EXPLICIT APPROVAL FROM THE SYSTEM OWNERS.\u00a0 I AM NOT ENDORSING OR APPROVING ANY ILLEGAL ACTIVITY WHICH COULD BE ACCOMPLISHED FOLLOWING THESE STEPS An older friend forgot his computer password; asked me for help. I booted the machine, and saw an email address where the Windows 10 username normally &hellip; <a href=\"https:\/\/crossan007.dev\/blog\/windows\/windows-10-password-recovery\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Windows 10 Password Recovery<\/span> <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[1,211],"tags":[227,228,33,226,109,212,225],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/crossan007.dev\/blog\/windows\/windows-10-password-recovery\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Windows 10 Password Recovery - Charles&#039; Blog\" \/>\n<meta property=\"og:description\" content=\"DISCLAIMER: DO NOT EXECUTE THIS PROCESS WITHOUT EXPLICIT APPROVAL FROM THE SYSTEM OWNERS.\u00a0 I AM NOT ENDORSING OR APPROVING ANY ILLEGAL ACTIVITY WHICH COULD BE ACCOMPLISHED FOLLOWING THESE STEPS An older friend forgot his computer password; asked me for help. I booted the machine, and saw an email address where the Windows 10 username normally &hellip; Continue reading Windows 10 Password Recovery &rarr;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/crossan007.dev\/blog\/windows\/windows-10-password-recovery\/\" \/>\n<meta property=\"og:site_name\" content=\"Charles&#039; Blog\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-03T22:01:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-03-03T22:02:12+00:00\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"crossan007\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/crossan007.dev\/blog\/#website\",\"url\":\"https:\/\/crossan007.dev\/blog\/\",\"name\":\"Charles&#039; Blog\",\"description\":\"SharePoint | PowerShell | Exchange | SCCM | Ubuntu | PHP | JavaScript | A\/V Live Production | More...\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/crossan007.dev\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/crossan007.dev\/blog\/windows\/windows-10-password-recovery\/#webpage\",\"url\":\"https:\/\/crossan007.dev\/blog\/windows\/windows-10-password-recovery\/\",\"name\":\"Windows 10 Password Recovery - Charles&#039; Blog\",\"isPartOf\":{\"@id\":\"https:\/\/crossan007.dev\/blog\/#website\"},\"datePublished\":\"2019-03-03T22:01:08+00:00\",\"dateModified\":\"2019-03-03T22:02:12+00:00\",\"author\":{\"@id\":\"https:\/\/crossan007.dev\/blog\/#\/schema\/person\/bd99569cd81332c8fd866d023848b979\"},\"breadcrumb\":{\"@id\":\"https:\/\/crossan007.dev\/blog\/windows\/windows-10-password-recovery\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/crossan007.dev\/blog\/windows\/windows-10-password-recovery\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/crossan007.dev\/blog\/windows\/windows-10-password-recovery\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/crossan007.dev\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Windows 10 Password Recovery\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/crossan007.dev\/blog\/#\/schema\/person\/bd99569cd81332c8fd866d023848b979\",\"name\":\"crossan007\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/crossan007.dev\/blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/fff72c74fb6a0da29accf0db83ad4b4b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/fff72c74fb6a0da29accf0db83ad4b4b?s=96&d=mm&r=g\",\"caption\":\"crossan007\"},\"url\":\"https:\/\/crossan007.dev\/blog\/author\/crossan007\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/crossan007.dev\/blog\/windows\/windows-10-password-recovery\/","og_locale":"en_US","og_type":"article","og_title":"Windows 10 Password Recovery - Charles&#039; Blog","og_description":"DISCLAIMER: DO NOT EXECUTE THIS PROCESS WITHOUT EXPLICIT APPROVAL FROM THE SYSTEM OWNERS.\u00a0 I AM NOT ENDORSING OR APPROVING ANY ILLEGAL ACTIVITY WHICH COULD BE ACCOMPLISHED FOLLOWING THESE STEPS An older friend forgot his computer password; asked me for help. I booted the machine, and saw an email address where the Windows 10 username normally &hellip; Continue reading Windows 10 Password Recovery &rarr;","og_url":"https:\/\/crossan007.dev\/blog\/windows\/windows-10-password-recovery\/","og_site_name":"Charles&#039; Blog","article_published_time":"2019-03-03T22:01:08+00:00","article_modified_time":"2019-03-03T22:02:12+00:00","twitter_misc":{"Written by":"crossan007","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/crossan007.dev\/blog\/#website","url":"https:\/\/crossan007.dev\/blog\/","name":"Charles&#039; Blog","description":"SharePoint | PowerShell | Exchange | SCCM | Ubuntu | PHP | JavaScript | A\/V Live Production | More...","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/crossan007.dev\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/crossan007.dev\/blog\/windows\/windows-10-password-recovery\/#webpage","url":"https:\/\/crossan007.dev\/blog\/windows\/windows-10-password-recovery\/","name":"Windows 10 Password Recovery - Charles&#039; Blog","isPartOf":{"@id":"https:\/\/crossan007.dev\/blog\/#website"},"datePublished":"2019-03-03T22:01:08+00:00","dateModified":"2019-03-03T22:02:12+00:00","author":{"@id":"https:\/\/crossan007.dev\/blog\/#\/schema\/person\/bd99569cd81332c8fd866d023848b979"},"breadcrumb":{"@id":"https:\/\/crossan007.dev\/blog\/windows\/windows-10-password-recovery\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/crossan007.dev\/blog\/windows\/windows-10-password-recovery\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/crossan007.dev\/blog\/windows\/windows-10-password-recovery\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/crossan007.dev\/blog\/"},{"@type":"ListItem","position":2,"name":"Windows 10 Password Recovery"}]},{"@type":"Person","@id":"https:\/\/crossan007.dev\/blog\/#\/schema\/person\/bd99569cd81332c8fd866d023848b979","name":"crossan007","image":{"@type":"ImageObject","@id":"https:\/\/crossan007.dev\/blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/fff72c74fb6a0da29accf0db83ad4b4b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fff72c74fb6a0da29accf0db83ad4b4b?s=96&d=mm&r=g","caption":"crossan007"},"url":"https:\/\/crossan007.dev\/blog\/author\/crossan007\/"}]}},"_links":{"self":[{"href":"https:\/\/crossan007.dev\/blog\/wp-json\/wp\/v2\/posts\/578"}],"collection":[{"href":"https:\/\/crossan007.dev\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/crossan007.dev\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/crossan007.dev\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/crossan007.dev\/blog\/wp-json\/wp\/v2\/comments?post=578"}],"version-history":[{"count":1,"href":"https:\/\/crossan007.dev\/blog\/wp-json\/wp\/v2\/posts\/578\/revisions"}],"predecessor-version":[{"id":579,"href":"https:\/\/crossan007.dev\/blog\/wp-json\/wp\/v2\/posts\/578\/revisions\/579"}],"wp:attachment":[{"href":"https:\/\/crossan007.dev\/blog\/wp-json\/wp\/v2\/media?parent=578"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/crossan007.dev\/blog\/wp-json\/wp\/v2\/categories?post=578"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/crossan007.dev\/blog\/wp-json\/wp\/v2\/tags?post=578"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}