Attacking SAM
June 05, 2024
Last updated
June 05, 2024
Last updated
First we will save the sam, system, security from the hklm
Then in the attacker machine we will create a directory so that the files we are getting will be going to be transferred here.
We will specify the name of the share that we want. Any name would be good but I just named it "SamData"
After that we will move the saved files that we created earlier to the attacker machine.
We can see that the files is here
Then we can just extract data from the sam databases since we have the system.save file
We can just use some online decrypt for the password NTLM hash of user ITbackdoor since it is pretty simple
Then just dump the lsa from smb