No excuse, DA everytime, 🔽
But wait, yet yet another dpapi dumping tool ?
Well @_zblurx has fully embraced the concept of CME and taken leverage of cmedb !
Everytime you found a valid credential, CME will add this cred in his own DB, CMEDB 🧙♂️
Now why this is important in the case of dpapi credentials ?🔽
Apr 6, 2020 • 5 tweets • 3 min read
How to defeat Hashcat !? 🛡️ Well, I think I found a workaround😈
Use a password with the following format :
⚔️ '$HEX[xxxx]' ⚔️ (where xxxx are only hex characters)
Unless a specific flag is added to hashcat, the attacker will never be able to crack it ! #hashcat
1/5⬇️⬇️⬇️
As you can see on the screenshot, the🚩'--wordlist-autohex-disable' needs to be added to hashcat to crack this pwd👻
This issue is already known by the hashcat team as you can see on Github and called an "hexception" 😆