You COULD obtain a copy of lophtcrack. This will attempt to try thousands of "common" passwords, and usually manages to guess a few in a large environment. Since this is CPU intensive, it is best run on a machine with a powerful CPU and graphics card.No need. Hashkiller has over 829.726 billion hashes available online
technically there is no way to retrieve user passwords using a script or via GUI. actually there is no such an API or backdoor available from Windows at all.There is to get password hash. It is the same as what is used when syncing password hashes to cloud providers. You don't even need DA rights, only directory sync rights
Don't be nice to your users, employ a complex password using group policy on your default domain policy and then run a script to force password change on next logon.Be nice to your users. Even Password1 is considered a complex 8 character password according to AD and Password1Password1 a complex 16 character password
There is to get password hash
whats the specific Windows API to get a password hascose?The same process Azure Active Directory Connect etc. uses when syncing password hashes. Read more on https://www.dsinternals.com/
You COULD obtain a copy of lophtcrack. This will attempt to try thousands of "common" passwords, and usually manages to guess a few in a large environment. Since this is CPU intensive, it is best run on a machine with a powerful CPU and graphics card.
It is kinda expensive, but there is a 15 day demo if you just want to do a one-off audit. (Edited, demo version is 15 days, not 30)
http://www.l0phtcrack.com/