lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Mon, 7 Jan 2008 12:53:46 -0700
From: "Reed Arvin" <reedarvin@...il.com>
To: bugtraq@...urityfocus.com, submissions@...ketstormsecurity.org,
	news@...uriteam.com, full-disclosure@...ts.grok.org.uk
Subject: PWDumpX v1.4 - Dumps domain password cache, LSA secrets, password hashes, and password history hashes.

PWDumpX v1.4 now dumps domain password cache (if available), LSA
secrets, password hashes, and password history hashes (if available).

==========

Usage: PWDumpX [-clph] <hostname | ip input file> <username> <password>

[-clpha]                    -- optional argument
<hostname | ip input file>  -- required argument
<username>                  -- required argument
<password>                  -- required argument

-c  -- Dump Password Cache
-l  -- Dump LSA Secrets
-p  -- Dump Password Hashes
-h  -- Dump Password History Hashes

If the <username> and <password> arguments are both plus signs (+), the
existing credentials of the user running this utility will be used.

Examples:
PWDumpX 10.10.10.10 + +
PWDumpX 10.10.10.10 administrator password

PWDumpX -lp MyWindowsMachine + +
PWDumpX -lp MyWindowsMachine administrator password

PWDumpX -clph IPInputFile.txt + +
PWDumpX -clph IPInputFile.txt administrator password

If an input list of remote systems is supplied, PWDumpX will attempt to
obtain the obtain the requested information from each remote Windows
system in a multi-threaded fashion (up to 64 systems simultaneously).

==========

Tool location: http://reedarvin.thearvins.com/tools/PWDumpX14.zip

Source code included.

Tool homepage: http://reedarvin.thearvins.com/tools.html

Thank you,

Reed Arvin <reedarvin_at_gmail.com>

Powered by blists - more mailing lists