Cracking NTLM Hashes with John the Ripper
Cracking NTLM Hashes with John the Ripper
Situation:
This exercise aimed to evaluate password security on costumes.artstailor.com
by cracking NTLM hashes captured from a mimikatz log file. Using John the Ripper and the rockyou.txt
wordlist, the goal was to assess the strength of the extracted passwords and highlight potential weaknesses in the organization’s password policies.
Obstacles:
- Formatting Challenges: Extracting and formatting the mimikatz log output into a proper hash file (
username:hash
) required attention to detail. - Wordlist Limitations: The
rockyou.txt
wordlist was effective but might not have included all possible password variations. - Partial Disclosure: Cracked passwords needed to be reported in a way that protects sensitive information while still demonstrating the breach.
Actions Taken:
- Hash Extraction:
- Downloaded the
mimikatz.log
file generated during a previous exercise. - Formatted relevant hash data into a new file named
hash
, following theusername:hash
convention.
- Downloaded the
- Wordlist Preparation:
- Copied the
rockyou.txt
wordlist from/usr/share/wordlists/
into the working directory.
- Copied the
- Password Cracking:
- Executed the following John the Ripper command:
sudo john --format=NT --wordlist=rockyou.txt hash
- Successfully cracked the password for the user
n.nomen
.
- Executed the following John the Ripper command:
- Verification:
- Confirmed the cracked password using the
--show
option in John the Ripper.
- Confirmed the cracked password using the
- Analysis:
- Reviewed the cracked password against NIST Special Publication 800-63B standards for password security.
Results:
- Password Cracked:
- User: n.nomen
- Password (partial):
m7!....os!
- Password Weaknesses:
- Password lacked sufficient length and complexity.
- Use of dictionary words and predictable patterns increased vulnerability.
- Risk Assessment:
- Risk Level: Critical.
- Cracking the password demonstrates the organization's inadequate password policies, which could lead to unauthorized access and data breaches.
Tool Purpose Overview:
mimikatz:
- Extracted NTLM hashes from system memory during post-exploitation.
John the Ripper:
- A password-cracking tool used to test the NTLM hashes against a predefined wordlist (
rockyou.txt
).
rockyou.txt:
- A widely used wordlist containing millions of real-world passwords, employed to simulate dictionary attacks.
Recommendations:
- Enhance Password Policies:
- Enforce a minimum password length of at least eight characters.
- Require the use of uppercase, lowercase, numbers, and special characters.
- Prohibit repetitive characters, dictionary words, and previously breached passwords.
- Adopt NIST 800-63B Standards:
- Regularly validate passwords against updated breach datasets.
- Educate users on creating secure passwords.
- Implement Multi-Factor Authentication (MFA):
- Reduce reliance on passwords alone by using MFA for an additional layer of security.
- Periodic Audits:
- Conduct routine audits of password policies and practices to ensure compliance with security standards.
View PDF Document