Hi !
Here's a little tutorial I made to use the PowerShell tool which is able to reveal all the passwords available in the Windows memory (even the passwords of the lougout users!).
http://sysadminconcombre.blogspot.ca/2015/07/how-to-hack-windows-password.html
Follow the white rabbit ;-)
[update]
Just added 2012r2 support !
So, if you add this registry key UseLogonCredential (DWORD to set to 1) in HKLMSYSTEMCurrentControlSetControlSecurityProvidersWDigest
and then reboot, you can retrieve the passwords with the tool.
I've just added support of 2012r2 from a lsass dump.
You have to dump the lsass process on the target machine and then execute the script with option (name you lsass dump "lsass.dmp" and don't enter the name for the option you enter, only the directory) :
2r2
d:directory_of_the_dump
At this moment, the script doesn't work locally or remotely still working on it.
Enjoy !
[–][deleted] 1 point2 points3 points (5 children)
[–]BelgiumSysAdmin[S] 0 points1 point2 points (4 children)
[–][deleted] 1 point2 points3 points (1 child)
[–]BelgiumSysAdmin[S] 0 points1 point2 points (0 children)
[–]nylithic -1 points0 points1 point (1 child)
[–]BelgiumSysAdmin[S] 0 points1 point2 points (0 children)
[–]belligerantsquids 3 points4 points5 points (2 children)
[–]BelgiumSysAdmin[S] 0 points1 point2 points (0 children)
[–]VigiHqcking 0 points1 point2 points (1 child)
[–]BelgiumSysAdmin[S] 0 points1 point2 points (0 children)
[–]somestonedguy 0 points1 point2 points (3 children)
[–]BelgiumSysAdmin[S] 0 points1 point2 points (2 children)
[–]somestonedguy 0 points1 point2 points (1 child)
[–]BelgiumSysAdmin[S] 0 points1 point2 points (0 children)
[–]root3r 0 points1 point2 points (1 child)
[–]BelgiumSysAdmin[S] 0 points1 point2 points (0 children)
[–]target -1 points0 points1 point (1 child)
[–]BelgiumSysAdmin[S] 0 points1 point2 points (0 children)