
Hashcat. Lots of lolz.
February, 2nd 2022
It's again that time fo the year! Yep, the time to perform your annual or bi-annual Active Directory password cracking exercise and report statistics on how weak your admin, technical or end-user accounts are.
Personally, it's an exercise I love.
Each time the same ritual:
- I go on https://hashcat.net/hashcat/ and download the latest version.
- Review the last cracking scenario I made and try to improve it.
- Review my cracking scripts and try to use my imagination to add another try that will get me some new passwords.
- Try to improve my personal dictionnary
Let's start by the beginning: Get your Active Directory passwords.
For this part I use the NTDS Utils and you will find here an excellent detailed article on how to do it step by step.
Remember that, if you do not feel comfortable, it cost nothing to setup a virtual server 2016 or 2019 and enable Active Directory on it to practice before...
Once you have your Active Directory dump, it's time to use the fantastic Directory Services Internals that will help you extract the data in text format from the RAW file you've retrieved using NTDS Utils
If you are lazy, just download this text file that I've generated for you and will simulate you've successfully dump your AD and extracted your user information. So you can use it below for hashcat cracking. Should you not be able to retrieve all the password in this hash file, you should review your scenario or improve your dictionary as these password are really not strong.
Give me six hours to chop down a tree and I will spend the first four sharpening the axe.
There is no cracking exercise without a first pass against a dictionary attack!
Well, lucky you, I provide you everything you need here: https://weakpass.com/wordlist
*BE SMART!*
There is a ton of dictionary out there on the internet, heavily specialized and based on language. If you are spanish it's good to ALSO have a specific dictionary based on Spanish language. It's especially true for first name dictionary. You will not find "Pablo" in an English dictionary...
Try to find a dictionary that fit your activitiy domain, there exist specific vocabulary words that worth being part of your attempt and are extremely different if you are working in health domain or in insurance domain.
Generate your own dictionary, do not forget your company name and all its possible way of writing it using leetspeak language.
Use the program named "cupp" that will give you lots of possibilities to create a custom dictionary for your company or victim.
That's it! You're all set for the first step of the cracking exercise using dictionary. Hashcat syntax for this purpose is quite clear and easy:
hashcat.exe -a 0 -m 1000 C:\hashes.txt C:\PwdDictionary.txt --remove --username -o C:\cracked_dictionary.txt -O
hashcat.exe -a 0 -m 1000 C:\hashes.txt C:\CompanyPwd.txt --remove --username -o C:\cracked_company_dict.txt -O
Now that you've done the dictionary attack phase, it's time to prepare your hashcat script for the real bruteforce but not a blind stupid brute force that will not lead you anywhere.
Smart Brute Force
Trying to brute force everything is useless and not the way to go.
At the time I'm writing these words, the fastest graphic card on the market is the GeForce RTX3090. It's about 121.2 millions NTLM hash per second. Which means that it's able to test every 8 characters long passwords in about 15 hours. If you go for all the 9 characters passwords it will take about 56 days. The good news is that you can use multiple graphic card with hashcat. Though, I never did it, I would love to see it with my own eyes some day.
I do not own such a graphic card monster and even if I would, I should still think smart before going all in.
You shall read the hashcat syntax before going further to understand what it's all about:
- ?l = abcdefghijklmnopqrstuvwxyz - ?u = ABCDEFGHIJKLMNOPQRSTUVWXYZ - ?d = 0123456789 - ?s = !"#$%&'()*+,-./:;<=>?@[\]^_`{|}~ - ?a = ?l?u?d?s You are also able to define your own combination using the following syntax: -1 ?l?u : meanse that by using "?1" you will match both upper and lower letter -2 0123 : meanse that by using "?2" you will be able to match 0,1,2,3 instead of all the 9 digit. Quite usefull for date!
Here is my personal attack scenario (in short):
- 1- If you have the power, go for all the 8 char passwords. It can take some days but it's worth it. It takes 5 days on my GeForce GTX 1070.
- 2- Target passwords with 6 letters starting with a capital letter or not and followed by 2 digits at the end. This will target small first name and year in two digit at the end but can also target city trip password like "Mexico22".
- 3- Target password with 6 letters starting with a capital letter or not and followed by 4 digits at the end. Same pattern target as above.
- 4- Target password with 7 letters starting with a capital letter or not and followed by 4 digits representing a year from 1950 to 1999. With this one and the belows we are definitely targetting people using their relatives as password with their birthday year in it.
- 5- Target password with 7 letters starting with a capital letter or not and followed by 4 digits representing a year from 2000 to 2029.
- 6- Target password with 7 letters starting with a capital letter or not and followed by 8 digits representing a date format DDMMYYYY.
- 7- All the above scenario adding at the beginning or at the end the very common special character "!", "*" and "%"
All these above scenario are defined below using hashcat syntax:
#Pure brute force all 8 char:
hashcat.exe -a 3 -m 1000 C:\hashes.txt --remove --username -o C:\cracked_all_8_char.txt -O ?a?a?a?a?a?a?a?a
#Without special character:
hashcat.exe -a 3 -m 1000 C:\hashes.txt --remove --username -o C:\cracked_6_char_2_dig.txt -O -1 ?l?u ?1?l?l?l?l?l?d?d
hashcat.exe -a 3 -m 1000 C:\hashes.txt --remove --username -o C:\cracked_6_char_4_dig.txt -O -1 ?l?u ?1?l?l?l?l?l?d?d?d?d
hashcat.exe -a 3 -m 1000 C:\hashes.txt --remove --username -o C:\cracked_7_char_19YY.txt -O -1 ?l?u -2 56789 ?1?l?l?l?l?l?l19?2?d
hashcat.exe -a 3 -m 1000 C:\hashes.txt --remove --username -o C:\cracked_7_char_20YY.txt -O -1 ?l?u -2 012 ?1?l?l?l?l?l?l20?2?d
hashcat.exe -a 3 -m 1000 C:\hashes.txt --remove --username -o C:\cracked_7_char_DDMM19YY.txt -O -1 0123 -2 01 -3 56789 -4 ?l?u ?4?l?l?l?l?l?l?1?d?2?d19?3?d
hashcat.exe -a 3 -m 1000 C:\hashes.txt --remove --username -o C:\cracked_7_char_DDMM20YY.txt -O -1 0123 -2 01 -3 012 -4 ?l?u ?4?l?l?l?l?l?l?1?d?2?d20?3?d
#With special character "!*%" at beginning or at the end:
hashcat.exe -a 3 -m 1000 C:\hashes.txt --remove --username -o C:\crckd_6_char_2_dig_1_spe_char.txt -O -1 ?l?u -2 !*% ?1?l?l?l?l?l?d?d?2
hashcat.exe -a 3 -m 1000 C:\hashes.txt --remove --username -o C:\crckd_1_spe_char_6_char_2_dig.txt -O -1 ?l?u -2 !*% ?2?1?l?l?l?l?l?d?d
hashcat.exe -a 3 -m 1000 C:\hashes.txt --remove --username -o C:\crckd_6_char_4_dig_1_spe_char.txt -O -1 ?l?u -2 !*% ?1?l?l?l?l?l?d?d?d?d?2
hashcat.exe -a 3 -m 1000 C:\hashes.txt --remove --username -o C:\crckd_1_spe_char_6_char_4_dig.txt -O -1 ?l?u -2 !*% ?2?1?l?l?l?l?l?d?d?d?d
hashcat.exe -a 3 -m 1000 C:\hashes.txt --remove --username -o C:\crckd_7_char_19YY_1_spe_char.txt -O -1 ?l?u -2 56789 -3 !*% ?1?l?l?l?l?l?l19?2?d?3
hashcat.exe -a 3 -m 1000 C:\hashes.txt --remove --username -o C:\crckd_1_spe_char_7_char_19YY.txt -O -1 ?l?u -2 56789 -3 !*% ?3?1?l?l?l?l?l?l19?2?d
hashcat.exe -a 3 -m 1000 C:\hashes.txt --remove --username -o C:\crckd_7_char_20YY_1_spe_char.txt -O -1 ?l?u -2 012 -3 !*% ?1?l?l?l?l?l?l20?2?d?3
hashcat.exe -a 3 -m 1000 C:\hashes.txt --remove --username -o C:\crckd_1_spe_char_7_char_20YY.txt -O -1 ?l?u -2 012 -3 !*% ?3?1?l?l?l?l?l?l20?2?d
Don't forget phone numbers, social security number, etc.
Your imagination leads the way...
Personal advices:
Advice 1: You can just type your hashcat command and wait for hashcat to tell you how much time it will take to complete. Sometimes, it will help you prioritize your test or simply forget them. Advice 2: USE hashcat session! This will give you the possibility to interrupt your brute force exercise when needed and avoid slaping you in the face like I did in the past. Advice 3: There is so much more in hashcat than what I have written above. It's the reason why you should perform password cracking exercise multiple time a year. At each iteration you should improve and implement an additional scenario to what you already have. Proceed with small steps. If you have a project dedicated to it, lucky you, go on and read the whole documentation. A long work, but it will be rewarded in the end.
Security considerations:
Retrieving password is a funny exercise but funny is not synonym of suicide mission. You shall *NOT* perform this exercise on a computer at home, except for practice.
Here are some advices that should help you to contain any data leakage/theft of your precious passwords.
- Your computer shall not be connected to any network. That means no RJ45 cable, no Wi-Fi card, no nothing. The whole exercise can and must be done offline.
- The NTDS export shall be encrypted using strong algorithm, such as AES256, and a goddamn strong password generated by a software like KeePass. Go for at least 64 character long. No look over the shoulder or whatever, you should encrypt this file alone.
- The NTDS export file shall be immediately safely deleted from your Active Directory server after you retrieved it.
- The computer on which you are going to perform the cracking exercise shall have the hard drive encrypted using Bitlocker.
- Try to work only with unencrypted data in memory. Try using RAM Disk. You should put in-memory the hashcat software itself, so that the potfile (that contains all the found password) is never written on the disk somewhere. The file that contains all your Active Directory password hashes shall also be in-memory. Yes, working in-memory might lose all the time and work spent to crack the password due to a power outage or a computer crash. But it's definitely better than a password leakage. The good news it that you will not have to worry about removing your trace after the exercise. Clean the memory with a nice closing of RAM disk and a shutdown. Like nothing happened.
- If you do not work in-memory for your password retrieval exercise, make sure that you can either completely wipe the drive or safely erase your trace after the exercise. Follow NIST or US DOD 5220.22-M (7 passes) standard for this.
- Make sure that the computer is locked and physicaly safe enough for the time of the exercise.
- In the end, you have found your user's passwords. The purpose is *NOT* to share these passwords with the whole company or the management, bullying a user with a weak password or play the King with among your colleagues. You shall report anonymised data to your management, like number of password found, length of these passwords, number of password using company name etc. Your role is to teach your colleagues why a strong password is needed, how easy it is to retrieve weak passwords, how powerful computers are nowadays and share your knowledge. Be proud when you won't find a single password. There lies your reward as a Security Officer.
I hope you enjoyed this article.