Windows password security test

First, the local administrator password how to direct extraction

1.1 read directly administrator password by mimikatz

(Not interactive, not at a webshell, good use graphical interface)

Article: privilege :: debug // elevated privileges

Article: sekurlsa :: logonpassWords // crawl password

1.2LaZagne Tools

Retrieving a large number stored on the local computer passwords, support for Windows, Linux platforms, powerful, but requires python environment.

Second, the local remote log in directly Hash

(Hash can not use this method when cracks)

Hash use remote login systems, mainly through exploit MSF provided / windows / smb / psexec module

Three, hash key brute force

Online website on it

Guess you like

Origin www.cnblogs.com/wkzb/p/12303123.html