Password hash dump and reuse

circle-info

Can use xfreerdp to PTH RDP

Local logon password dump

mimikatz.exe (need high integrity)

dump from memory LSASS

dump from SAM

crack

CME dump hashes remotely (with local admin creds/hash)

Impacket dump all user password from SAM

circle-info

useful when having admin shell but no account creds, to get local admin hash for pth

victim

kali

with admin creds can dump from kali remote

alt

circle-info

When have admin but not accessible SAM & SYSTEM, create a shadow copy and dump

circle-info

if no admin priv, may try look for .OLD SAM & SYSTEM

commonly in C:\Windows\System32\Config, C:\Windows\System32\Repair, or C:\Windows\System32\Config\Regback

Domain password dump

/user:target e.g. built-in domain admin acct Administrator; or /all

Check where the credentials can be used

CME PtH for rev

NTLM PtH with local Administrator / AD user (not applicable to kerberos)

circle-info

works with local admin right, 445

NTLM -> TGT Overpass the hash - gain tickets as specific users (other logoned local admin)

circle-info

works with local admin right

No SMB Winrm

Last updated