Attacking SAM
June 05, 2024

First we will save the sam, system, security from the hklm
reg.exe save hklm\sam C:\sam.save
reg.exe save hklm\system C:\system.save
reg.exe save hklm\security C:\security.save
Then in the attacker machine we will create a directory so that the files we are getting will be going to be transferred here.
We will specify the name of the share that we want. Any name would be good but I just named it "SamData"

After that we will move the saved files that we created earlier to the attacker machine.

We can see that the files is here

Then we can just extract data from the sam databases since we have the system.save file

We can just use some online decrypt for the password NTLM hash of user ITbackdoor since it is pretty simple

Then just dump the lsa from smb

Last updated