O'Reilly logo

Kali Linux Cookbook - Second Edition by Bob Perciaccante, Corey P. Schultz

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Dump hashes

We will now perform a password hash dump of the windows VM:

  1. Let's now dump the user hashes, so we can crack them later and use them as part of other exploits. Start by right-clicking on the Windows XP VM, and you will see a new option. Select Meterpreter 3 | Access | Dump Hashes | registry method; at the next screen, select Launch.
  2. You will now see the hashes dumped to the screen, and they will also be saved in our loot store. Also, take a look through the output file; and you will see that password hints were also dumped. Jane Doe's password hint is jane123 - Could that be her password?
armitage hashdump output
  1. If you close ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required