Windows
Gather Info
> systeminfoFile Transfers winPEAS
net localgroup administrators
net user [username]Password Attacks
Registry Hives
HKLM\SAM
Contains password hashes for local user accounts. These hashes can be extracted and cracked to reveal plaintext passwords.
HKLM\SYSTEM
Stores the system boot key, which is used to encrypt the SAM database. This key is required to decrypt the hashes.
HKLM\SECURITY
Contains sensitive information used by the Local Security Authority (LSA), including cached domain credentials (DCC2), cleartext passwords, DPAPI keys, and more.
Using reg.exe to copy registry hives
This must be done with Admin privileges
Create an SMB share to transfer the files to your machine (impacket-smbserver)
Use move command to move files to SMB share
Using secretsdump to dump hashes
Dumping LSA secrets remotely
We can sometimes dump LSA secrets with netexec:
You may also be able to do the same with the SAM
Last updated