Attacking SAM

June 05, 2024

First we will save the sam, system, security from the hklm

reg.exe save hklm\sam C:\sam.save
reg.exe save hklm\system C:\system.save
reg.exe save hklm\security C:\security.save

Then in the attacker machine we will create a directory so that the files we are getting will be going to be transferred here.

We will specify the name of the share that we want. Any name would be good but I just named it "SamData"

After that we will move the saved files that we created earlier to the attacker machine.

We can see that the files is here

Then we can just extract data from the sam databases since we have the system.save file

We can just use some online decrypt for the password NTLM hash of user ITbackdoor since it is pretty simple

Then just dump the lsa from smb

Last updated