


msf auxiliary( handler) > use post/windows/gather/hashdump This initial version just handles LM/NTLM credentials from hashdump and uses the standard wordlist and rules. To crack complex passwords or use large wordlists, John the Ripper should be used outside of Metasploit. The goal of this module is to find trivial passwords in a short amount of time. The John The Ripper module is used to identify weak passwords that have been acquired as hashed files (loot) or raw LANMAN/NTLM hashes (hashdump). Security Operations for Beginners (SOC-100).Exploit Development Prerequisites (EXP-100).

Boy, was that an ordeal just for something simple. Apparently, all stupid me needed to do was to delete the "username." before each hash number. "Number" of course meaning the actual hash value. All of the hashes in the file were listed as `username.number`. HAlmussajjen helped me solve this in a chat. Thanks a lot for your help, HAlmussajjen. I'm hoping someone else has done this exercise and knows what they did to solve it, or if you have more experience with Linux and can intuit what I'm doing wrong, that would be great as well. I was able to exploit the vulnerability as per instructions in the comment box in order to obtain a password hash dump file named hashes.txt. Using a vmware, I set the network cards to the host-only private network on both Kali linux and CTF8. It has us run a version of the server before it's been updated and patched so that it has plenty of vulnerabilities. It has us using a CTF8 linux server and the instructions are for backtrack, but I'm using Kali Linux instead. I'm stuck on page 49 of the PDF instructions for hours doing internet searches and not being sure what to do. I'm doing the LAMPSecurity CTF Exercise 7. The myhashes.txt didn't work at that point either. I have even tried to use the unshadow command and point the command to create a myhashes.txt. I have tried moving both files into the same directory, /usr/share/wordlists. I had to actually pull the rockyou.txt file out of the compressed file, and I merely left it in that same folder. rockyou.txt is the default common-passwords list that comes with Kali's default version of John the Ripper. The command I'm using is this: john -wordlist=/usr/share/wordlists/rockyou.txt –-format=raw-MD5 /root/hashes.txtĪnd yes, both files are in those correct directories. The password file I'm using was from a dump off of a CTF8 server's website is rockyou.txt I'm sort of just following the instructions on the LAMPSecurity CTF exercise 7 PDF. Must I use a different user account than root? Must that other user account have root or bash authority, I have no idea about most of this stuff. I'm not sure if there's something wrong with using this directory. The error I'm getting is this: Using default input encoding: UTF-8
