A Windows SAM database dump sits before you, containing encrypted password hashes from a corporate network. The NTLM hashes hold the keys to user accounts and potentially sensitive information. With the right tools and wordlists, can you crack these hashes and uncover what's hidden inside?
Windows systems store password hashes in the Security Account Manager (SAM) database. These NTLM (NT LAN Manager) hashes can be extracted during penetration tests and cracked offline to recover plaintext passwords.
You have obtained a dump of Windows SAM hashes from a target system during a penetration test. The dump contains several user accounts with NTLM password hashes. Your objective is to crack the password for the secretuser account - the cracked password itself is the flag.
The SAM dump uses the standard format:
username:RID:LM_hash:NTLM_hash:::
Where the NTLM hash (4th field) is the MD4 hash of the password that you need to crack.
Choose how you want to get started
Choose a username to get started
We've sent a 9-character code to your email