Password hash dump and reuse

Can use xfreerdp to PTH RDP

Local logon password dump

mimikatz.exe (need high integrity)

dump from memory LSASS

dump from SAM

crack

CME dump hashes remotely (with local admin creds/hash)

Impacket dump all user password from SAM

useful when having admin shell but no account creds, to get local admin hash for pth

victim

kali

with admin creds can dump from kali remote

alt

When have admin but not accessible SAM & SYSTEM, create a shadow copy and dump

if no admin priv, may try look for .OLD SAM & SYSTEM

commonly in C:\Windows\System32\Config, C:\Windows\System32\Repair, or C:\Windows\System32\Config\Regback

Domain password dump

/user:target e.g. built-in domain admin acct Administrator; or /all

Check where the credentials can be used

CME PtH for rev

NTLM PtH with local Administrator / AD user (not applicable to kerberos)

works with local admin right, 445

NTLM -> TGT Overpass the hash - gain tickets as specific users (other logoned local admin)

works with local admin right

No SMB Winrm

Last updated