(This is the third and final post of a three part series on Microsoft Active Directory password quality auditing)
Following on from part 2 where we used DS-Internals to extract NT hashes and John the Ripper to crack them, in this post we cover what to actually do with all of this (usually worrying) information.
What to do with a list of cracked passwords
Now that John has done his good work, you will likely have a list of passwords and their associated user accounts from some of your users. Once you’ve gotten off the floor and climbed back into your chair, you may start to think: “This is great! We can see exactly who has bad passwords. If they were good we wouldn’t have cracked them so easily.” So now what…[Read more…] about Enforcing better Active Directory passwords (Password audit part 3)