Un petit tableau sous Google Doc pour vous donner un aperçu des possibilités des tools les plus connus.
Liste des tools présents dans le fichier :
- Cain & Abel
- pwdump2
- pwdump6
- pwdump7
- PowerDump
- fgdump
- PWDumpX
- gsecdump
- carrot
- Metasploit smart_hashdump (post module)
- Metasploit hashdump (post module)
- Metasploit hashdump (script)
- Metasploit hashdump (command)
- mimikatz
- pwhist
- bkhive / samdump2
- creddump by moyix
- ntds_dump_hash
- NTDSXtract
- passcape Windows Password Recovery
- pdbedit on Unix/Linux
- passcape Network Password Recovery
- lsadump2
- LSASecretsDump
- LSASecretsView
- Network Password Recovery (netpass)
- Metasploit gather/credentials/enum_cred_store (post module)
- creddump by oxid.it
- Protected Storage PassView (pspv)
- Metasploit gather/credentials/windows_autologin (post module)
- Windows Credentials Editor (WCE)
- Pass-The-Hash Toolkit (PTH)
- lslsass
- RunhAsh
- msvctl
- incognito
- find_token
- cachedump
- Metasploit gather/cachedump (post module)
- WirelessKeyView
- Metasploit wlan/wlan_profile (post module)
- vncpwdump
- VNCPassView
- Metasploit gather/vnc (post module)
- Metasploit getvncpw (script)
Pour s'y retrouver, l'auteur a pensé à tout classer :
- Tool
- Command line
- GUI
- Local
- Remote
- SAM
- Password history
- LSA secrets
- Credential manager
- Protected storage
- Autologin
- Logon sessions
- Clear-text logon sessions
- Session tokens
- Cached domain logon information
- Wireless
- VNC
- Certificates and keys
- 32-bit
- 64-bit
- Windows XP/2003
- Windows Vista/2008/7
- RDP session isolation
- Notes
- Commands
Lien du doc : https://docs.google.com/spreadsheet/...re=4cf92&pli=1
Source : http://bernardodamele.blogspot.fr/
Liste des tools présents dans le fichier :
- Cain & Abel
- pwdump2
- pwdump6
- pwdump7
- PowerDump
- fgdump
- PWDumpX
- gsecdump
- carrot
- Metasploit smart_hashdump (post module)
- Metasploit hashdump (post module)
- Metasploit hashdump (script)
- Metasploit hashdump (command)
- mimikatz
- pwhist
- bkhive / samdump2
- creddump by moyix
- ntds_dump_hash
- NTDSXtract
- passcape Windows Password Recovery
- pdbedit on Unix/Linux
- passcape Network Password Recovery
- lsadump2
- LSASecretsDump
- LSASecretsView
- Network Password Recovery (netpass)
- Metasploit gather/credentials/enum_cred_store (post module)
- creddump by oxid.it
- Protected Storage PassView (pspv)
- Metasploit gather/credentials/windows_autologin (post module)
- Windows Credentials Editor (WCE)
- Pass-The-Hash Toolkit (PTH)
- lslsass
- RunhAsh
- msvctl
- incognito
- find_token
- cachedump
- Metasploit gather/cachedump (post module)
- WirelessKeyView
- Metasploit wlan/wlan_profile (post module)
- vncpwdump
- VNCPassView
- Metasploit gather/vnc (post module)
- Metasploit getvncpw (script)
Pour s'y retrouver, l'auteur a pensé à tout classer :
- Tool
- Command line
- GUI
- Local
- Remote
- SAM
- Password history
- LSA secrets
- Credential manager
- Protected storage
- Autologin
- Logon sessions
- Clear-text logon sessions
- Session tokens
- Cached domain logon information
- Wireless
- VNC
- Certificates and keys
- 32-bit
- 64-bit
- Windows XP/2003
- Windows Vista/2008/7
- RDP session isolation
- Notes
- Commands
Lien du doc : https://docs.google.com/spreadsheet/...re=4cf92&pli=1
Source : http://bernardodamele.blogspot.fr/
Commentaire