Windows Login Password Recovery
OSForensics supports password recovery of Microsoft Windows user accounts by
using Rainbow Tables to compare hash values that are stored in the Windows
registry.
For more information about password recovery in OSForensics see the sections
below;
Recovering the Hash Values
Using Rainbow Tables
Recovering the Hash Values
Windows stores hash values for user passwords in the SAM registry hive. With access to the SAM and SYSTEM registry hives, OSForensics can recover the LM or NT hashes for the local Windows user accounts. To retrieve the hash values, go to the Windows Login Passwords tab in the Passwords section of OSForensics, select the appropriate device to scan and click the "Acquire Passwords" button. You should see a list of recovered usernames and hash values, and if you check the "Test common password" option you may see some simple passwords that were immediately cracked.
Once you have the hash values, click the "Save to File" button to save them as a
PWDUMP formatted text file. You can now use a rainbow table to process the file
and check for password matches.
Using Rainbow Tables
In the example below, I simply copied the NT hash value and pasted it into the hash box. I then chose an appropriate hash set and clicked ‘Recover Passwords’. OSForensics displayed the decrypted password in under a second.
Due to the way the LM hash values are generated, (although the passwords can be up to 14 characters long), the final hash value is actually a concatenation of two, 7 character password hashes, so the table only needs to be generated for a length of 1-7.
PassMark offers a large collection of Rainbow Tables and Hash Sets for purchase here.