It is easy to create a dictionary file from any text or binary file (e.g. a memory image, hibernation or swap file). It order to compile your file into Passware Kit dictionary format (*.dic), follow the steps below. 1. Run Passware Kit against your password-protected file, then choose “Advanced: Customize Settings”. Drag the “Dictionary” attack from […]
Windows stores account passwords for all the logged-in users in memory. This holds true for Windows XP through Windows 8. Passwords are encrypted and are not visible in plain text, but there is still a way to identify and decrypt those passwords. When a computer hibernates, Windows writes all the physical RAM memory contents to […]
Mac OS X Lion stores salted SHA512 hashes of user accounts passwords. NOTE: if a memory image of a target computer is available, Mac OS X login passwords could be recovered instantly. Password hashes are stored in /private/var/db/dslocal/nodes/Default/users/<username>.plist files.
Improving password recovery success rates Limited time and resources are usually the two biggest constraints for password recovery. A live memory image could contain encryption keys and passwords, but what are the options if there is no such image available? There are two important metrics for measuring effectiveness of password recovery: success rate and time […]
Also posted in How To, Passware