Local Password Exploits and Countermeasures Presentation (SAM/Syskey, Domain Cache, VNC & Protected Storage)


I have finished a Flash version of the Local Password Exploits and Countermeasures presentation I’m working on for the Indiana Higher Education Cybersecurity Summit (http://www.indiana.edu/~cacrsum/program.html). It covers cracking the SAM/Syskey, Cached ADS/Domain Credentials, VNC stored passwords and Windows Protected Storage

Here is the link to see the tutorial:

http://www.irongeek.com/i.php?page=v...sswordCracking

It’s about 5.3MB and has almost 30 min of audio in it. Don't mirror it anywhere yet as I may change it some before I present it live on the 29th. If you have any feedback you would like to give me before the 29th email me. The Flash file may have some bugs so let me know if you find any.

Topics covered (from the slide headings):

Local Password Exploits and Countermeasures
Why Crack Local Passwords?
Escalating Network Privileges Example
Methodology
Glossary
What’s Meant by Password Cracking?
What’s not meant by password cracking?
Cracking Passwords in the SAM
How does a dictionary or brute force attack work?
Commercial tools for cracking the SAM
L0phtcrack
SAMInside
Open Source/Free tools for cracking the SAM
Pwdump2/Pwdump3
Cain
SAMDump2/BKhive/John the Ripper
RainbowCrack
SAM Cracking Prevention
Cracking Cached Domain/Active Directory Passwords
Cached Credentials Format
CachDump and John patches:
John the Ripper
VNC (Virtual Network Computing) Background
Tools for Cracking VNC
VNCrack
VNCPwdump
VNC Password Cracking Countermeasures
Retrieving Passwords from Protected Storage
Protected Storage Countermeasures