Post Exploitation With Windows Credentials Editor (WCE) - Dump Windows Password Hashes

Поділитися
Вставка
  • Опубліковано 8 лют 2025
  • Hey guys! In this video, I will be demonstrating how to perform post exploitation with windows credentials editor (WCE), and how dump windows password hashes. This tool can be used, for example, to perform pass-the-hash on Windows, obtain NT/LM hashes from memory (from interactive logons, services, remote desktop connections, etc.), obtain Kerberos tickets and reuse them in other Windows or Unix systems and dump cleartext passwords entered by users at login.
    Link:
    PowerShell Empire: github.com/Emp...
    ◼️Get Our Courses:
    Python For Ethical Hacking: www.udemy.com/...
    ◼️Our Platforms:
    Hsploit: hsploit.com/
    HackerSploit Forum: hackersploit.org/
    HackerSploit Discord: / discord
    HackerSploit Podcast: / hackersploit
    iTunes: itunes.apple.c...
    ◼️Support us by using the following links:
    NordVPN: nordvpn.org/ha...
    Patreon: / hackersploit
    I Hope you enjoy/enjoyed the video.
    If you have any questions or suggestions feel free to post them in the comments section or on my social networks.
    Social Networks - Connect With Us!
    -------------------------------
    Facebook: / hackersploit
    Twitter: / hackersploit
    Instagram: / hackersploit
    Patreon: / hackersploit
    --------------------------------
    Thanks for watching!
    Благодаря за гледането
    Kiitos katsomisesta
    Danke fürs Zuschauen!
    感谢您观看
    Merci d'avoir regardé
    دیکھنے کے لیے شکریہ
    देखने के लिए धन्यवाद
    Grazie per la visione
    Gracias por ver
    شكرا للمشاهدة
    #RedTeam#WCE

КОМЕНТАРІ • 44

  • @AnshumanPattnaik
    @AnshumanPattnaik 5 років тому +1

    Thanks for your tutorials your contents are very rich it will be very much helpful for all the beginners.

  • @kylexyxy1919
    @kylexyxy1919 5 років тому +2

    Great tutorial as always 😀❤️

  • @NawabKhan-vq5de
    @NawabKhan-vq5de 5 років тому +1

    amazing sir keep it up and we are waiting for your more tuts...

  • @Cramiac
    @Cramiac 5 років тому +1

    My question is not about the video.
    I have an error in my network adapter which says error in the intel dual band driver and an error (code 56) in the device manager.
    Need help!!!

  • @deadbodymanq
    @deadbodymanq 5 років тому

    if you have access to a network, but not the devices on it. assuming they are windows devices, is there a to dump the hashes of those devices?

  • @zionstemple
    @zionstemple 5 років тому +6

    I think the path has changed for wce its at /usr/share/windows-resources/wce

    • @8080VB
      @8080VB 3 роки тому +1

      Thx mate , i was searching for this

  • @hariprasad4612
    @hariprasad4612 5 років тому +2

    Sir can you make video on how to pentrate Web server (with high security one) and prevention of dos and ddos attacks

  • @anirbanshow8653
    @anirbanshow8653 5 років тому

    This is an awesome video sir also I purchased tomorrow your course from Udemy that's hacking with python that is good too

    • @kylexyxy1919
      @kylexyxy1919 5 років тому

      Anirban Show ohh really can you gimme this course link plz :)

    • @anirbanshow8653
      @anirbanshow8653 5 років тому

      @@kylexyxy1919 yes why not bro

    • @kylexyxy1919
      @kylexyxy1919 5 років тому +1

      Anirban Show Thanks Bro already found in description on this video 😄

  • @AhmadAli-wd3eo
    @AhmadAli-wd3eo 5 років тому

    Thank you bro.. I learned a lot from your video..

  • @aminahabdullah5938
    @aminahabdullah5938 3 роки тому

    how do u specify port number 1234 ? is base on smth ?

  • @bharadwajn.k9185
    @bharadwajn.k9185 5 років тому

    You are a good tutor

  • @pythonfun2354
    @pythonfun2354 4 роки тому

    I am not getting wce.exe file in parrot OS
    How can i solve it

  • @amartyatagore9589
    @amartyatagore9589 5 років тому

    How to perform this kind of things in win 10 please?

  • @namisalha4987
    @namisalha4987 5 років тому

    Can you make a video for me to learn how to use qemu virtual machine?

  • @deepakverma6751
    @deepakverma6751 5 років тому

    How we can do in Windows 10?

  • @solomonkane5978
    @solomonkane5978 5 років тому

    will this works with windows server 2012 R2?

  • @animeapqv1233
    @animeapqv1233 5 років тому

    I wonder if top hackers use kali like the ones that hack Verizon ETC

  • @kimookimoo8544
    @kimookimoo8544 3 роки тому

    I have rar5 hash for encrypted file , it's size 15 megabytes can you crack it's password for money you need

  • @zacharyhibbitts8999
    @zacharyhibbitts8999 5 років тому

    HackerSploit I have a low end laptop with 4 gb of ram I was wondering if it would be possible to run kali linux in a virtual machine

    • @8080VB
      @8080VB 3 роки тому

      Yes you can

  • @sanuj-bansal
    @sanuj-bansal 5 років тому

    ❤️❤️❤️❤️❤️

  • @elliotalderson4467
    @elliotalderson4467 5 років тому

    When i upload the wce file my Metasploit says: core_channel_open: Operation failed: Access is denied

    • @8080VB
      @8080VB 3 роки тому

      Found the solution?? I found

  • @8080VB
    @8080VB 3 роки тому

    Very cool , but this works only if the user is logged in administrator account. .

  • @durgeshsingh6938
    @durgeshsingh6938 5 років тому

    please make a video on how bypass window login using chntpw tool of kali ..please consider it

    • @niladridhar
      @niladridhar 5 років тому

      Boot Linux in forensic mode.Then open c folder using terminal.Then type this command-
      cd Windows/System 32/config
      chntpw -l SAM
      chntpw -u (username) SAM
      press 1
      press q
      press y
      Done

  • @yuzhenwang8103
    @yuzhenwang8103 3 роки тому

    1:50 Windows 10 not supported, dismiss

  • @amarabd1888
    @amarabd1888 5 років тому

    Hello Friend i already saw your perfecct video but i found some videos deleted can reupload it plz on other website thank

  • @unixware6453
    @unixware6453 5 років тому +1

    if the victim machine has anti-virus , it will be deleted as soon as you upload them . useless . these are registered in most antivirus signature databases

  • @alexchen3983
    @alexchen3983 3 роки тому

    amason~

  • @youngwetto2362
    @youngwetto2362 5 років тому +2

    Notifications gang

  • @dulipramanik7001
    @dulipramanik7001 5 років тому

    Fuck it up

  • @MauricioAlvarado2fast4u
    @MauricioAlvarado2fast4u 5 років тому +2

    Do not talk so much, add the information in the description.

    • @kylexyxy1919
      @kylexyxy1919 5 років тому

      Mauricio Alvarado You r noob 😆😜

  • @8080VB
    @8080VB 3 роки тому

    Please specify what payload you used
    Edit : the payload he used is meterpreter reverse tcp .py

  • @pythonfun2354
    @pythonfun2354 4 роки тому

    I cannot get wce2.exe file in parrot OS
    How can i solve it