Grabbing and cracking macOS password hashes (with dscl and hashcat)

Поділитися
Вставка
  • Опубліковано 26 січ 2023
  • Let's look at the dscl utility on macOS that allows hackers to query directory services information, including extracting sensitive fields such as the password hash. An admin can extract the ShadowHashData and then attempt to crack the hash with a tool such as hashcat.
    This is a post-exploitation technique to be aware of as Red and Blue Teamers and build tests and detections for.
    As always: Pentesting requires authorization from proper stakeholders. Do not engage in testing/targeting any accounts that you do not own.
  • Наука та технологія

КОМЕНТАРІ • 17

  • @fpipe-hg4os
    @fpipe-hg4os 9 місяців тому +2

    So, you're already elevated. That's most definitely worth mentioning at the beginning of this video and in the description.

    • @embracethered
      @embracethered  9 місяців тому +1

      Thanks for watching! Sorry for not being clear enough, description mentions both the need to be admin and that it’s a post-exploitation scenario. Hope the video was still useful though.

    • @ewoltin
      @ewoltin 2 місяці тому

      lmao, facepalm

  • @FleaMarketSocialist
    @FleaMarketSocialist Рік тому +1

    Great video, Red. You deserve WAY more subs!

    • @embracethered
      @embracethered  Рік тому

      Thanks for the comment, really appreciate it! 😀

  • @alexsteiner6103
    @alexsteiner6103 9 місяців тому

    How could I contact you ? I got a problem with my school computer

  • @JohnDoe-wi7eb
    @JohnDoe-wi7eb Рік тому

    How do you use Hashcat on Apple scullion

  • @user-lh8fg4ou6i
    @user-lh8fg4ou6i 8 місяців тому

    Hi, I'm having an issue with the 'wordlist' section at the end.. I don't have a wordlist file.. how to create one or where to find?

    • @embracethered
      @embracethered  Місяць тому

      Here are some good examples: github.com/danielmiessler/SecLists

  • @icarusswitkes6833
    @icarusswitkes6833 11 місяців тому +1

    It keeps saying signature unmatched No hashes loaded. I tried putting in the example hash from the website too and it has the same issue. Do you know what the problem is or how to fix it?

    • @embracethered
      @embracethered  10 місяців тому

      Interesting, sorry not sure if I can help much. Maybe there is a copy/paste error or typo when putting the strings together in the hashcat line? I got it to work many times.

  • @Kev376
    @Kev376 Рік тому

    So I have a friend wanting me to crack the password on their macbook, I am only familiar with windows personally but know hashcat well enough, basically am I able to run this DSCL even if you can't get into the computer? like I said i'm not familiar with macbook all I know is they can't get into the computer.

    • @FleaMarketSocialist
      @FleaMarketSocialist Рік тому

      Try booting the mac into single user mode by holding command+S on boot? dscl might require some dependancies that single user does not load so I'm not sure? If that fails you can always try KonBoot to gain access first, then open terminal and go from there to actually get the password hash.

    • @Kev376
      @Kev376 Рік тому

      @@FleaMarketSocialist Yeah thats what i'm going to try, what about doing the root trick i know it's 5 years old but this may be an older laptop since it was his late dads. the trick is from the video ua-cam.com/video/IPsUM48H4MY/v-deo.html which crazy allows you to log into a root account or something.

  • @Astranix59
    @Astranix59 Місяць тому +2

    What wordlist file do you use?

    • @embracethered
      @embracethered  Місяць тому

      Depends, a common source to get started is: github.com/danielmiessler/SecLists. Also, quite significant are the mutations and rulesets that are being used by the way.

    • @Astranix59
      @Astranix59 Місяць тому

      @@embracethered thank you!!