11-17-2014, 12:13 AM
Generally you need to have access to the password database to obtain hashes. This generally involves compromising a system at some level. The exception to this is e.g. network protocols (WPA, NetNTLM, Kerberos, etc.) and non-hash formats (MS Office, TrueCrypt, etc.)