Credentials Dumping
Credentials Dumping
The following examples use a username and plaintext password, although user/hash combos work as well.
Dump SAM
Dump SAM hashes using methods from secretsdump.py
You need at least local admin privilege on the remote target, use option --local-auth if your user is a local account
nxc smb 192.168.1.0/24 -u UserNAme -p 'PASSWORDHERE' --samDump LSA
Dump LSA secrets using methods from secretsdump.py
Requires Domain Admin or Local Admin Privileges on target Domain Controller!
nxc smb 192.168.1.0/24 -u UserNAme -p 'PASSWORDHERE' --lsaDump NTDS.dit
Requires Domain Admin or Local Admin Privileges on target Domain Controller
2 methods are available:
TIP: You can also DCSYNC with the computer account of the DC
There is also the ntdsutil module that will use ntdsutil to dump NTDS.dit and SYSTEM hive and parse them locally with secretsdump.py
Dump LSASS
You need at least local admin privilege on the remote target, use option --local-auth if your user is a local account
Using Lsassy
Using the module Lsassy from @pixis you can dump remotely the credentials
Using nanodump
Using the module nanodump you can dump remotely the credentials
Using Mimikatz (Deprecated)
You need at least local admin privilege on the remote target, use option --local-auth if your user is a local account
Using the module Mimikatz, the powershell script Invoke-mimikatz.ps1 will be executed on the remote target
Dump WiFi password
You need at least local admin privilege on the remote target, use option --local-auth if your user is a local account
Get the WIFI password register in Windows
Dump KeePass
You can check if keepass is installed on the target computer and then steal the master password and decrypt the database!
Dump DPAPI
You can dump DPAPI credentials using NetExec using the following option --dpapi. It will get all secrets from Credential Manager, Chrome, Edge, Firefox. --dpapi support options :
You need at least local admin privilege on the remote target, use option --local-auth if your user is a local account
Dump Winlogon registration data
Dump Stored Credentials from mRemoteNG Configuration
Dump PuTTY Private Keys
View the Dumped Key locally
Dump Notepad++ Session Logs
Dump Powershell Command History
Dump WinSCP configuration files
Dump VNC passwords
Dump Backup Operators Permission (SAM, SYSTEM and SECURITY hives)
Last updated