Secretsdump
Last updated
Last updated
Use secretsdump to get SAM database, LSA cached logon, machine account and some DPAPI informations
The sam database contains the local accounts. We will ignore vagrant as it is the default user to setup the lab.
The important information here is the NT hash of the local administrator user.
We also got the LSA cache of the last connected users (by default windows keep the last 10 users), this is useful to connect to the server even if the domain controller is unreachable. But those cached credentials can be cracked offline with hashcat (very slow).
And to finish we also got the hash of the computer account. (Sometimes you will get no useful domain accounts or no information at all on a domain joined computer but if you get this hash you got an account on the domain!)