Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20140114122532.GA16290@16s.us>
Date: Tue, 14 Jan 2014 07:25:32 -0500
From: "Richard B. Tilley" <brad@....us>
To: john-users@...ts.openwall.com
Subject: Re: Cracking MSChap v2

On Tue, Jan 14, 2014 at 12:13:27AM -0500, Rich Rumble wrote:
> WCE and Mimikatz are more game changing I think.
> http://www.ampliasecurity.com/research/wcefaq.html
> http://blog.gentilkiwi.com/mimikatz https://github.com/thomhastings/mimikatz-en
> Mimikatz is now able to read memory dumps of the lsass.exe process
> (you can right-click the process in task manager to make one) and mimi
> can read that without having to be on the box, all you need is the
> mem-dump and you get all windows passwords on the machine for most
> accounts. WCE has to be local at this time, I believe there are others
> too that can now do this.

<snip>

Rich,

I agree with your assessment and have seen these tools in use by bad guys on networks. Mimikatz can dump domain credentials, too, if a user has authenticated to the machine (where Mimikatz is running) using domain credentials. If a domain or enterprise admin authenticates, the rest is history.

That's all I had. Hope this is not too off-topic for john-users. My apologies if it is.

Brad

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.