Post Exploitation With Windows Credentials Editor (WCE) - Dump Windows Password Hashes
Вставка
- Опубліковано 8 лют 2025
- Hey guys! In this video, I will be demonstrating how to perform post exploitation with windows credentials editor (WCE), and how dump windows password hashes. This tool can be used, for example, to perform pass-the-hash on Windows, obtain NT/LM hashes from memory (from interactive logons, services, remote desktop connections, etc.), obtain Kerberos tickets and reuse them in other Windows or Unix systems and dump cleartext passwords entered by users at login.
Link:
PowerShell Empire: github.com/Emp...
◼️Get Our Courses:
Python For Ethical Hacking: www.udemy.com/...
◼️Our Platforms:
Hsploit: hsploit.com/
HackerSploit Forum: hackersploit.org/
HackerSploit Discord: / discord
HackerSploit Podcast: / hackersploit
iTunes: itunes.apple.c...
◼️Support us by using the following links:
NordVPN: nordvpn.org/ha...
Patreon: / hackersploit
I Hope you enjoy/enjoyed the video.
If you have any questions or suggestions feel free to post them in the comments section or on my social networks.
Social Networks - Connect With Us!
-------------------------------
Facebook: / hackersploit
Twitter: / hackersploit
Instagram: / hackersploit
Patreon: / hackersploit
--------------------------------
Thanks for watching!
Благодаря за гледането
Kiitos katsomisesta
Danke fürs Zuschauen!
感谢您观看
Merci d'avoir regardé
دیکھنے کے لیے شکریہ
देखने के लिए धन्यवाद
Grazie per la visione
Gracias por ver
شكرا للمشاهدة
#RedTeam#WCE
Thanks for your tutorials your contents are very rich it will be very much helpful for all the beginners.
Great tutorial as always 😀❤️
amazing sir keep it up and we are waiting for your more tuts...
My question is not about the video.
I have an error in my network adapter which says error in the intel dual band driver and an error (code 56) in the device manager.
Need help!!!
if you have access to a network, but not the devices on it. assuming they are windows devices, is there a to dump the hashes of those devices?
I think the path has changed for wce its at /usr/share/windows-resources/wce
Thx mate , i was searching for this
Sir can you make video on how to pentrate Web server (with high security one) and prevention of dos and ddos attacks
This is an awesome video sir also I purchased tomorrow your course from Udemy that's hacking with python that is good too
Anirban Show ohh really can you gimme this course link plz :)
@@kylexyxy1919 yes why not bro
Anirban Show Thanks Bro already found in description on this video 😄
Thank you bro.. I learned a lot from your video..
how do u specify port number 1234 ? is base on smth ?
You are a good tutor
I am not getting wce.exe file in parrot OS
How can i solve it
How to perform this kind of things in win 10 please?
Can you make a video for me to learn how to use qemu virtual machine?
How we can do in Windows 10?
will this works with windows server 2012 R2?
I wonder if top hackers use kali like the ones that hack Verizon ETC
I have rar5 hash for encrypted file , it's size 15 megabytes can you crack it's password for money you need
HackerSploit I have a low end laptop with 4 gb of ram I was wondering if it would be possible to run kali linux in a virtual machine
Yes you can
❤️❤️❤️❤️❤️
When i upload the wce file my Metasploit says: core_channel_open: Operation failed: Access is denied
Found the solution?? I found
Very cool , but this works only if the user is logged in administrator account. .
please make a video on how bypass window login using chntpw tool of kali ..please consider it
Boot Linux in forensic mode.Then open c folder using terminal.Then type this command-
cd Windows/System 32/config
chntpw -l SAM
chntpw -u (username) SAM
press 1
press q
press y
Done
1:50 Windows 10 not supported, dismiss
Hello Friend i already saw your perfecct video but i found some videos deleted can reupload it plz on other website thank
if the victim machine has anti-virus , it will be deleted as soon as you upload them . useless . these are registered in most antivirus signature databases
asasaas asasas bind with encrypted tool
Exactly ..
That's why use mimikatz .
He uses win7
amason~
Notifications gang
Fuck it up
Do not talk so much, add the information in the description.
Mauricio Alvarado You r noob 😆😜
Please specify what payload you used
Edit : the payload he used is meterpreter reverse tcp .py
I cannot get wce2.exe file in parrot OS
How can i solve it