Our Scenarios
password security

Windows PasswordDumping101

Info

When conducting penetration tests against Windows environments, you often need to retrieve credentials / hashed passwords after you have successfully compromised a target machine. There are several ways to do this depending on what type of machine the target is (e.g. normal server / workstation vs Domain Controller).

What you will learn

After completing this scenario you will learn where Windows stores local password hashes and where it stores domain password hashes, and how to retrieve them after compromising a target (the scenario assumes you have already compromised the target)

Technical Details

This scenario contains one virtual machine running a windows operating system, which you need to connect to / interact with.

Pre-requisites

It is highly advisable to be familiar with the hashing algorithms that Windows uses to store passwords. You can complete the Scenario "Windows Passwords 101" to become familiar

It is also advisable to be somewhat familiar with the concept of Windows Domains, but this is not necessary. If you like, you can complete the Scenario "Windows Domains 101" to become familiar.

  • MODESINGLEPLAYER
  • TYPECCL
  • DIFFICULTYEASY
  • TIME120 MINUTES
  • COST10 CRYSTALS
SHARE