Just another security blog

  • Home
  • Security Tools
  • Wireless
  • Web Apps
  • NAND To Tetris
  • Active Directory
  • Exploit Development
  • HTB Write-Ups
  • Android
  • Linux Priv Esc

Saturday, 13 February 2021

Dumping Local SAM hashes with secretsdump.py

Using stolen credentials to dump local SAM hashes is easy with a tool called secretsdump.py

Simply run it against the machine you have access to and it will dump the SAM file:

secretsdump.py pwnme.local/ecartman:Password1@192.168.1.60

Posted by swepsie at 12:33
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Labels: Active Directory, Security Tools, Windows Privilege Escalation

No comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

Search This Blog

Blog Archive

  • ▼  2021 (18)
    • ►  March (2)
    • ▼  February (16)
      • Creating a backdoor using SSH keys
      • ***Cron Jobs, tar archives and Wildcards ***
      • Priv esc via Path Variables
      • Hacking Android Phones
      • Stealing Admin Credentials via Group Policy Prefer...
      • Dumping Local SAM hashes with secretsdump.py
      • Owning the domain using Golden Tickets
      • Accessing domain services via Kerberoasting attack
      • Accessing accounts without a password by Passing t...
      • Extracting database contents via SQL Injection Uni...
      • Doctor
      • Utilising PHP wrappers to read PHP source code
      • Remote File Inclusion to shell access
      • Capturing local SAM hashes via SMB relay attack
      • Buffer Overflow to reverse root shell
      • LLMNR Poisoning to Shell access
  • ►  2014 (21)
    • ►  November (2)
    • ►  October (1)
    • ►  September (2)
    • ►  May (3)
    • ►  April (13)
Awesome Inc. theme. Theme images by fpm. Powered by Blogger.