How to extract hashes and crack Windows Passwords

This page will help you to know how to extract hashes from Windows systems and crack them.

It's all about LM and NTLM hashes

Blog Single

LM and NTLM basics

/!\ This is for educational purposes only, and should not be used for unauthorized access, tampering or accessed illegally without owner permission.

The LM hash is the old style hash used in Microsoft OS before NT 3.1. Then, NTLM was introduced and supports password length greater than 14.
On Vista, 7, 8 and 10 LM hash is supported for backward compatibility but is disabled by default.

The goal is too extract LM and/or NTLM hashes from the system, either live or dead. These hashes are stored in memory (RAM) and in flat files (registry hives).

Extracting the hashes from the SAM (locally)

If LM hashes are enabled on your system (Win XP and lower), a hash dump will look like:


If LM hashes are disabled on your system (Win Vista, 7, 8+), a hash dump will look like:

Administrator:500:NO PASSWORD*********************:0CB6948805F797BF2A82807973B89537:::

The first field is the username. The second field is the unique Security IDentifier for that username. The third field is the LM hash and the forth is the NTLM hash.

Best tools

The best tools to extract hashes (windows & linux & mac) are :

Example with fgdump

  • Double click on fgdump.exe you've just downloaded,
  • After a few seconds a file "" has been created
  • Edit this file with notepad to get the hashes
  • Copy and paste the hashes into our cracking system, and we'll crack them for you.

On Linux (or Live system such as Kali/Backtrack) you can use creddump (python based), or Samdump2 :

bt ~ # samdump2 /mnt/XXX/WINDOWS/system32/config/system /mnt/XXX/WINDOWS/system32/config/sam

samdump2 2.0.1 by Objectif Securite (
original author: [email protected]


You can then post the hashes to our cracking system in order to get the plain text.

Extracting Windows Password hashes from memory (RAM)

You can use :

Extracting Windows Password hashes remotely

Man In the Middle attack

You can use ettercap and the man in the middle attacks to sniff the username and password of a user over the network. You can read ettercap tutorials. There so much that ettercap can do and there are many tutorials covering how to use it !

Metasploit / hashdump

Metasploit is an interesting pentest framework. Documentation is at Once you have compromised the computer using metasploit you can extract the hashes doing :

use priv

Dump Tools

fgdump or pwdump6 can also remotely dump hashes :

C:\> fgdump.exe -h -u AnAdministrativeUser [-p password]
C:\> pwdump6.exe -u AnAdministrativeUser [-p password]

Here, AnAdministrativeUser's account will be used to perform the password dump. Keep in mind that any user used to perform password dumps needs administrative credentials. In this scenario, you will be prompted for the password before the password dump starts.
fgdump hashes are stored in *.pwdump file ; pwdump6 will dump the SAM to the screen.

You can then post the hashes to our cracking system in order to get the plain text.

Note #1

A large number of -old- tools, which extract hashes from the registry were confirmed as producing corrupted hashes when using the registry extraction method were as follows :

  • Metasploit Hashdump Script
  • Creddump
  • Samdump2 1.0.1
  • Cain and Abel
  • Pwdump
  • Pwdump5
  • Pwdump7
  • FGDump 3.0
  • l0phtcrack 6.0

More information about this issue : Stamp Out Hash Corruption, Crack All the Things! - BlackHat 2012

Note #2

Related article : How to extract Cached and Stored Credentials & LSA secrets

Share this Post: