Skip to main content

Hash - DCC

  • Description: Retrieve the password of the Administrator user from the information output by the secretsdump tool of the Impacket suite.
  • Difficulty: Very easy

🔎 Solution​

The provided challenge file contains output from the Impacket tool secretsdump.py. Our task is to find the password for the Administrator account.

We can see this information:

Administrator:500:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::

This is a SAM hash in the format username : RID : LM hash : NT hash. However:

  • aad3b435b51404eeaad3b435b51404ee → This is the empty LM hash (indicating LM hashes are disabled in Windows).
  • 31d6cfe0d16ae931b73c59d7e0c089c0 → This is the default NT hash for an empty password.

All users in the list have identical hashes, strongly suggesting they use a blank password.

Further down, we find Cached Domain Credentials (msCache / DCC2 Hashes). These are offline cached domain credentials used when the domain controller is unreachable. The format is DCC2 ($DCC2$):

ROOTME.LOCAL/Administrator:15a57c279ebdfea574ad1ff91eb6ef0c:Administrator

Save this string to a file:

echo "Administrator:15a57c279ebdfea574ad1ff91eb6ef0c" > hash.txt

Use john to crack the hash using the rockyou wordlist:

> john --format=mscash hash.txt --wordlist=rockyou.txt
Using default input encoding: UTF-8
Loaded 1 password hash (mscash, MS Cache Hash (DCC) [MD4 32/64])
Will run 4 OpenMP threads
Press 'q' or Ctrl-C to abort, almost any other key for status
ilikethat (Administrator)
1g 0:00:00:00 DONE (2025-11-27 09:12) 50.00g/s 7577Kp/s 7577Kc/s 7577KC/s mckinley1..armenio

The password for the Administrator user is ilikethat.

🚩Flag​

ilikethat