The general direction is, mount the virtual drive on attack host, then extract hash from
<Mount_Point>/Windows/System32/config/usingimpacket-secretsdump
Mount VMDK on Linux#
guestmount -a SQL01-disk1.vmdk -i --ro /mnt/vmdkMount VHD/VHDX on Linux#
guestmount --add WEBSRV10.vhdx --ro /mnt/vhdx/ -m /dev/sda1Mount Bitlocker VHD#
Crack hash#
Rip hash#
bitlocker2john -i Backup.vhd > backup.hashes
bitlocker2johncreates 4 hashes. The first two correspond to the BitLocker password, while the latter two is the recovery key hash. Recovery key is string with length of 48, so recommended not cracking that. The hash starts with$bitlocker$0$is the password hash
grep "bitlocker\$0" backup.hashes > backup.hashCrack#
john --wordlist=/usr/share/wordlists/rockyou.txt ./backup.hashMount#
Install tool#
sudo apt-get install dislockerMount#
Create 2 mount dir
sudo mkdir -p /media/bitlocker
sudo mkdir -p /media/bitlockermountUse losetup to configure the VHD as loop device
sudo losetup -f -P Backup.vhdSee what name is the loop device, in this case, loop0p1
lsblk
NAME MAJ:MIN RM SIZE RO TYPE MOUNTPOINTS
loop0 7:0 0 64M 0 loop
└─loop0p1 259:0 0 61M 0 partDecrypt the drive using dislocker. -u to specify password. -- to mark end of program’s options
sudo dislocker /dev/loop0p1 -u1234qwer -- /media/bitlockerMount the decrypted volume
sudo mount -o loop /media/bitlocker/dislocker-file /media/bitlockermount