Windows

Gather Info

> systeminfo
net localgroup administrators
net user [username]

Password Attacks

Registry Hives

HKLM\SAM

Contains password hashes for local user accounts. These hashes can be extracted and cracked to reveal plaintext passwords.

HKLM\SYSTEM

Stores the system boot key, which is used to encrypt the SAM database. This key is required to decrypt the hashes.

HKLM\SECURITY

Contains sensitive information used by the Local Security Authority (LSA), including cached domain credentials (DCC2), cleartext passwords, DPAPI keys, and more.

Using reg.exe to copy registry hives

This must be done with Admin privileges

Create an SMB share to transfer the files to your machine (impacket-smbserver)

Use move command to move files to SMB share

Using secretsdump to dump hashes

Dumping LSA secrets remotely

We can sometimes dump LSA secrets with netexec:

You may also be able to do the same with the SAM

Last updated