Skip to content

jonathanwd/volatility_password_recovery

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

21 Commits
 
 

Repository files navigation

User Password Retreival From Memory Dump

Download and Install 32-bit Windows 7 Virtual Machine

  • Windows 7 VMs can be downloaded from Microsoft at https://developer.microsoft.com/en-us/microsoft-edge/tools/vms/.
  • Install the VM on the platform of your choice. These VMs expire after 90 days, so Microsoft recommends creating a snapshot after the initial installation. You may need to restart the VM after installation.

Download Volatility

Obtain Memory Image Using DumpIt

  • Download the DumpIt executable from https://github.com/thimbleweed/All-In-USB/tree/master/utilities/DumpIt and save the file onto the VM.
  • Open a command prompt on the VM.
  • Navigate to the folder containing "DumpIt.exe".
  • Run DumpIt: DumpIt.exe. Dumpit will produce a memory image with a name similar to the Virtal Machine name (for example "IE8WIN7-20200116-184345.raw") but has been renamed to "image.dmp" in the examples below.

Retrieve Password Using Volatility

Find the Volatility profile

  • Copy the memory image "image.dmp" to the folder containing "volatility-2.5.standalone.exe".
  • Run volatility-2.5.standalone.exe -f image.dmp imageinfo to find the profile (based on the operating system and service pack version, "Win7SP1x86" in the examples below).

Dump Registry Hives

  • Run volatility-2.5.standalone.exe -f image.dmp --profile=Win7SP1x86 hivelist to see the registry hive offsets.
  • We will need the SYSTEM (-y) and SAM (-s) virtual offests (0x87a1c008 and 0x8a4299c8 in the example below).

Dump Password Hashes

  • Run volatility-2.5.standalone.exe -f image.dmp --profile=Win7SP1x86 hashdump -y 0x87a1c008 -s 0x8a4299c8 > hashes.txt to dump the password hashes. Be sure to replace the virtual offsets with the ones you found in the previous step.
  • View the hashes in the command prompt: type hashes.txt
  • Copy the hashes to https://crackstation.net/ to crack the passwords (the NTLM hash is the part between the third colon and the final three colons).

References

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published