The Cain Tool Presented by: Sagar Chivate CS 685F.

Slides:



Advertisements
Similar presentations
Windows XP System Restore July 22 nd, 2006 CAEUG Meeting.
Advertisements

For further information computersecurity.wlu.ca
XP Tutorial 4 New Perspectives on Microsoft Windows XP 1 Microsoft Windows XP Personalizing Your Windows Environment Tutorial 4.
Operating Systems First Program to load. Controls Hardware And software. Enable User to operate PC( Personal Computer) –Examples: DOS: Disk Operating.
In this tutorial I will be taking you through how the clients folder works in the online version of Solidata Mortgage Tracker.
Lesson 18 – INSTALLING AND SETTING UP WINDOWS 2000 SERVER.
Keeping You Connected Through Citrix Access your applications Access your network shares and documents Access your …and do it remotely!
Lesson 5-Accessing Networks. Overview Introduction to Windows XP Professional. Introduction to Novell Client. Introduction to Red Hat Linux workstation.
Lab 03 Windows Operating Systems (Cont.). PYP002 Preparatory Computer ScienceWindows Operating System2 Objectives Develop a good understanding of 1. The.
Panasonic Computer Products Europe CF-08 Live Set up.
File sharing. Connect the two win 7 systems with LAN card Open the network.
Ch 9 Managing Active Directory User Accounts. Objectives Create Organizational Unit Creating User Accounts in Active Directory Disabling, Enabling, and.
Installing a New Windows Server 2008 Domain Controller in a New Windows Server 2008 R2.
Copyright 2007, EMC Paradigm Publishing Inc. WINDOWS XP BACKNEXTEND 1-1 LINKS TO OBJECTIVES Starting Windows Using the Taskbar, opening & switching programs.
A+ Guide to Software Managing, Maintaining and Troubleshooting THIRD EDITION Chapter 5 Understanding and Installing Windows NT and Windows 2000.
Remote Accessing Your Home Computer Using VNC and a Dynamic DNS Name.
Windows Tutorial 9 Maintaining Hardware and Software
TAX-AIDE Network Router Setup Network Printer Setups July SMT/TCS Training - Dallas1.
Multi-Functional Printer Scan-to-PC (SMB) Office of the Chief Information Officer (OCIO) The Hong Kong Institute of Education Last Update: 06 Dec 2013.
Ch 8-3 Working with domains and Active Directory.
Internet Setup in Microsoft Windows Windows Layering Bindings Adding Adapters, Protocols, and Clients TCP/IP Configuration.
Chapter 7 Installing and Using Windows XP Professional.
Ch 11 Managing System Reliability and Availability 1.
70-270: MCSE Guide to Microsoft Windows XP Professional Chapter 5: Users, Groups, Profiles, and Policies.
Microsoft Windows 2003 Server. Client/Server Environment Many client computers connect to a server.
1 ISA Server 2004 Installation & Configuration Overview By Nicholas Quinn.
One to One instructions Installing and configuring samba on Ubuntu Linux to enable Linux to share files and documents with Windows XP.
Configuring the MagicInfo Pro Display
Services and Disk Management. Default Services (some) Alerter ClipBook Server Computer Browser DNS Client Event Log Messenger Net Logon Network DDE Network.
TUTORIAL # 2 INFORMATION SECURITY 493. LAB # 4 (ROUTING TABLE & FIREWALLS) Routing tables is an electronic table (file) or database type object It is.
Back to content Final Presentation Mr. Phay Sok Thea, class “2B”, group 3, Networking Topic: Mail Client “Outlook Express” *At the end of the presentation.
Tutorial 11 Installing, Updating, and Configuring Software
Chapter 14: Remote Server Administration BAI617. Chapter Topics Configure Windows Server 2008 R2 servers for remote administration Remotely connect to.
Installing the SAFARIODBC.EXE For use with Excel May 3, 2002.
Hands-On Virtual Computing
6.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 6: Administering User Accounts.
Module 10: Configuring Windows XP Professional to Operate in Microsoft Networks.
COMPREHENSIVE Windows Tutorial 9 Maintaining Hardware and Software.
Installing Ricoh Printers There are two basic steps: 1. Acquire the drivers. 2. Use the Windows Add Printer Wizard to install the drivers within the operating.
Mac Set up and printer installation Vaibhav Pandit A&S IT 11/29/2007.
Network Security: Lab#4-2 Packet Sniffers J. H. Wang Dec. 2, 2013.
Network Management Tool Amy Auburger. 2 Product Overview Made by Ipswitch Affordable alternative to expensive & complicated Network Management Systems.
Installing and Using Active Directory Written by Marc Zacharko.
Otasuke GP-EX! Chapter 11 GP-Viewer EX
Computer Security and Penetration Testing Chapter 16 Windows Vulnerabilities.
1. Insert the Resource CD into your CD-ROM drive, click Start and choose Run. In the field that appears, enter F:\XXX\Setup.exe (if “F” is the letter of.
PC Maintenance: Preparing for A+ Certification Chapter 23: Using a Windows Network.
DIT314 ~ Client Operating System & Administration CHAPTER 5 MANAGING USER ACCOUNTS AND GROUPS Prepared By : Suraya Alias.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 13 Understanding and Installing Windows 2000 and Windows NT.
How to configure DNS for a Windows 2000 domain? 1.Start the Install/Remove Programs Control Panel Applet (Start - Settings - Control Panel - Add/Remove.
Local Network for 3GPP Meeting 1. Directory Configuration for 3GPP Meeting 2. How to connect your PC to Local Network 3. Set Up for Microsoft NetMeeting.
1 Part-1 Chap 5 Configuring Accounts Definitions.
® Microsoft Access 2010 Tutorial 12 Managing and Securing a Database.
McGraw-Hill/Irwin The Interactive Computing Series © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Microsoft Access 2002 Using Access Tools.
XP New Perspectives on Microsoft Office FrontPage 2003 Tutorial 7 1 Microsoft Office FrontPage 2003 Tutorial 8 – Integrating a Database with a FrontPage.
Information Security 493. Lab # 4 (Routing table & firewalls) Routing tables is an electronic table (file) or database type object that is stored in a.
IT1001 – Personal Computer Hardware & system Operations Week7- Introduction to backup & restore tools Introduction to user account with access rights.
 Start Microsoft Word from the icon or shortcut for the application. This is usually accessible from the Start Button. Then go to Programs, then Microsoft.
IS493 INFORMATION SECURITY TUTORIAL # 1 (S ) ASHRAF YOUSSEF.
VMWare Workstation Installation. Starting Vmware Workstation Go to the start menu and start the VMware Workstation program. *Note: The following instructions.
1 /17 Installing and Configuring TaxWise © 2006, Universal Tax Systems, Inc. All Rights Reserved. Installing and Configuring TaxWise Objectives –In this.
Windows 7 Manual for Wireless connectivity at Libraries Table of Contents Windows 7 Connectivity a) Installing the Secure W2 EAP Suite b) Selection.
/alexwaston14/fix-pc-error u/0/b/ /pages/Fix-PC- Error/
Chapter Objectives In this chapter, you will learn:
ZIMBRA DESKTOP USER MANUAL
Windows Operating Systems (Cont.)
Software for Eligible Beneficiaries Accession
Windows Tutorial 9 Maintaining Hardware and Software
Gurpreet Singh CSE/IT.
Presentation transcript:

The Cain Tool Presented by: Sagar Chivate CS 685F

Introduction Features  Tool for cracking various kinds of passwords on Windows platforms using dictionary attack and brute force attacks Version 2.0 for Windows 9x: Some Important features:  Screen saver password recover  Local share password manager  pwl password recover  Access database password manager

…Introduction Version 2.5 for Windows NT/ 2000/ XP Some important features:  Password cracker for NT hashes  Trace Route with DNS resolver and WhoIs client  Route table manager  Users, group, shares and services enumeration  Access (9x, 2000, XP) password decoder  Processor information

Download and Installation  Go to site  Click on Projects and then click on Cain & Abel  Download version 2.0 (for Windows 9x) or version 2.5 (for Windows NT/2000/XP)  You will also need to install WinPcap which installs packet.dll, the driver used by the Cain tool. WinPcap installation starts after Cain & Abel installation.  Size on disk Cain & Abel (5.41 MB) WinPcap 2.3 (100 KB)  Abel service will automatically start when you reboot your PC

Version 2.0 (Windows 9x)

Local Shares  Go to Menu Attack  Click on Local Shares  Double-click on displayed shares to view/alter sharing information

Screen Saver Password  To set Windows screen saver password: On windows desktop right click and select properties Click on Screen Saver tab Select the screen saver Check “Password Protected” check box Click the “Change” button and set the password  In Cain Tool go to Menu Attack  Click on Screen Saver to get screen saver password

Windows Password Manager  To change Windows password Go to Menu Tools Select Change Windows Password Enter Old and New passwords  To change Windows screen saver password Go to Menu Tools Select Change Screen Saver Password Enter New Password

Map Drive  Go to Menu Tools  Select Map Network Drive  Choose the drive and the path to be mapped  Checking Reconnect on logon check box Reconnects the Mapped drive on logon  Click Ok to map the drive

Local Password Recover  Go to Menu Attack  Click on PWL files  Local PWL files will be displayed. There will be one file per user  Right click on the file to attack the password  Start attack starts dictionary attack followed by brute-force attack

Version 2.5 (Windows NT/ 2000/ XP)

Users, Groups, Shares and Services  Click on Network tab  Double click on Microsoft Windows Network to view all the subnets in your network

Processor Information  Click on Menu “Tools”  Select Processor Info to view processor information

NT Hash and LanMan Hash SAM : System Account Manager: A password database stored as a registry file in Window NT and Windows  NT is only as secure as its SAM data The Windows NT SAM database stores the hashed password for each user account in two forms:  "NT hash" form that is used to authenticate users on Windows NT clients  "LM hash" form that is used to authenticate users on Windows 95, Windows 98, and down-level clients such as DOS, Windows 3.1, Windows for Workgroups, OS/2 and Macintosh.

Password Cracker Configuration Options  Click on Menu “Configure”  Select Dictionary options and Brute-Force options to configure password cracker options

Password Cracker for NT hashes  Select Cracker tab  Double click on the cracker key in the left menu to see all the supported crackers for different hashes  Click on NT hashes  Go to Menu File and select Add to list  In dialog box select Dump NT hashes from local machine and click Next  All the current NT users will be added along with their LM and NT hashes  Right click on the user and choose to start Dictionary attack or brute-force attack

Trace Route  Click on the tab Traceroute  Go to Menu File  Click Add to list  Enter the destination hostname/ IP address (Ex.  Set other parameters as desired and click Ok to view the traced route

References  Oxid.it  Password Crackers category=Password%20Crackers  User Authentication with Windows NT us;q102716

Thank you !