Skip to content

Commit 4bfbd01

Browse files
authored
Added Documentation
1 parent deec6ec commit 4bfbd01

File tree

1 file changed

+35
-0
lines changed

1 file changed

+35
-0
lines changed
Lines changed: 35 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,35 @@
1+
## Overview
2+
This module changes a user's password by carving a hash in the windows registry.
3+
4+
1. It doesn't change the "password last changed" field
5+
2. You can set a hash directly, so you can change a user's password and revert it without cracking it's hash.
6+
3. It bypasses the password complexity requirements
7+
8+
## Module Options
9+
- **USER** - This option allows you to specify the user you wish to change the password of.
10+
- **PASS** - This option allows you to specify the password to be set in the form of a clear text password, a single NT hash, or a couple of LM:NT hashes.
11+
12+
## Module Process
13+
Here is the process that the module follows:
14+
15+
- Retrieves list of users from the registry.
16+
- If the user is found it attempts to:
17+
- load the user key from the registry
18+
- check if the lm and nt hashes exit in the key
19+
- replace the hashes if they exist
20+
- write they user key back into the registry
21+
22+
## Recommandations
23+
I would recommand to use hashdump before using the module to backup the user hashes
24+
Use at your own risk.
25+
26+
## Limitations
27+
28+
At some point, Windows 10 stopped storing users in that exact way, users whose password was set after that change would not be vulnerable. This will be updated once someone figures how the hashes are now stored.
29+
30+
The module does not modify the user key architecture, you cannot set a hash on a user that does not have a password.
31+
32+
## Usage
33+
run post/windows/manage/hashcarve user=test pass=password
34+
run post/windows/manage/hashcarve user=test pass=nthash
35+
run post/windows/manage/hashcarve user=test pass=lmhash:nthash

0 commit comments

Comments
 (0)