‘New version of PWDump2 allows dumping of password hashes Active Directory ‘

Summary
Credit:

‘The information was provided by: Todd Sabin.’


Details

‘PWDump2 is an application which dumps the password hashes (OWFs) from NT’s SAM database, whether or not SYSKEY is enabled on the system. NT Administrators can now enjoy the additional protection of SYSKEY, while still being able to check for weak users’ passwords. The output follows the same format as the original pwdump (by Jeremy Allison), and can be used as input to l0phtcrack, or used with Samba. You need the SeDebugPrivilege for it to work. By default, only Administrators have this right, so this program does not compromise NT security.

This new version adds two new features:
 * It can now dump password hashes from Active Directory. (The original version wasn’t able to do this.) The feature allows dumping password hashes from Windows 2000 domain controllers.
 * It can determine the pid of lsass automatically, so you don’t need to supply it on the command line.

PWDump2’s home page can be found at:
http://razor.bindview.com/tools/desc/pwdump2_readme.html

PWDump2 can be downloaded from:
http://razor.bindview.com/tools/files/pwdump2.zip

Categories: Tools