Volatility/Retrieve-password
Jump to navigation
Jump to search
You are here | Retrieve a user's password from a memory dump
|
Description
This tutorial explains how to retrieve a user's password from a memory dump.
Steps
First identify the profile:
$ ./vol.py -f ch2.dmp imageinfo Volatility Foundation Volatility Framework 2.4 INFO : volatility.plugins.imageinfo: Determining profile based on KDBG search... Suggested Profile(s) : Win7SP0x86, Win7SP1x86 AS Layer1 : IA32PagedMemoryPae (Kernel AS) AS Layer2 : FileAddressSpace (ch2.dmp) PAE type : PAE DTB : 0x185000L KDBG : 0x82929be8L Number of Processors : 1 Image Type (Service Pack) : 0 KPCR for CPU 0 : 0x8292ac00L KUSER_SHARED_DATA : 0xffdf0000L Image date and time : 2013-01-12 16:59:18 UTC+0000 Image local date and time : 2013-01-12 17:59:18 +0100
Then dump the hives. We are interested in 2 offsets: SYSTEM (-y) and SAM (-s)
$ ./vol.py -f ch2.dmp --profile=Win7SP1x86 hivelist Volatility Foundation Volatility Framework 2.4 Virtual Physical Name ---------- ---------- ---- 0x8ee66740 0x141c0740 \SystemRoot\System32\Config\SOFTWARE 0x90cab9d0 0x172ab9d0 \SystemRoot\System32\Config\DEFAULT 0x9670e9d0 0x1ae709d0 \??\C:\Users\John Doe\ntuser.dat 0x9670f9d0 0x04a719d0 \??\C:\Users\John Doe\AppData\Local\Microsoft\Windows\UsrClass.dat 0x9aad6148 0x131af148 \SystemRoot\System32\Config\SAM 0x9ab25008 0x14a61008 \SystemRoot\System32\Config\SECURITY 0x9aba79d0 0x11a259d0 \??\C:\Windows\ServiceProfiles\LocalService\NTUSER.DAT 0x9abb1720 0x0a7d4720 \??\C:\Windows\ServiceProfiles\NetworkService\NTUSER.DAT 0x8b20c008 0x039e1008 [no name] 0x8b21c008 0x039ef008 \REGISTRY\MACHINE\SYSTEM 0x8b23c008 0x02ccf008 \REGISTRY\MACHINE\HARDWARE 0x8ee66008 0x141c0008 \Device\HarddiskVolume1\Boot\BCD
Now, we can dump the password hashes:
$ ./vol.py -f ch2.dmp --profile=Win7SP1x86 hashdump -y 0x8b21c008 -s 0x9aad6148 > hashes.txt Volatility Foundation Volatility Framework 2.4
Here is what the export looks like. We want to find John Doe's password.
$ cat hashes.txt Administrator:500:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0::: Guest:501:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0::: John Doe:1000:aad3b435b51404eeaad3b435b51404ee:b9f917853e3dbf6e6831ecce60725930:::
Let's use crackstation, an online password hash cracker:
Hash Type Result ----------------------------------- ------- -------------- b9f917853e3dbf6e6831ecce60725930 NTLM passw0rd
We have found the password!