Previously on Hak5, we showed off an USB Rubber Ducky payload to steal plaintext Windows passwords in 15 seconds. So, what if we told you we could get just the logon hash in under two? A 2 second technique for stealing Windows password hashes and otherwise auditing corporate USB drive policies! Learn more on today’s episode of Hak5.
Our Site: http://www.hak5.org
Contact Us: http://www.twitter.com/hak5
Core Security Impacket
Hak5 ep 912: Password Hash Attack
Hak5 ep 1218: Extreme GPU Password Cracking
Source: Security news