EoP - Looting for passwords
1. Accessing Password Hashes
1.1 Security Account Manager (SAM) and SYSTEM Files
1.2 Extracting Hashes
pwdump SYSTEM SAM > /root/sam.txtsamdump2 SYSTEM SAM -o sam.txt1.3 Cracking Hashes
john --format=NT /root/sam.txt2. Exploiting Vulnerabilities
2.1 HiveNightmare (CVE-2021-36934)
3. LAPS (Local Administrator Password Solution) Settings
Extract LAPS Settings
4. Searching for Passwords in Files and Shares
4.1 Local File Search
4.2 Searching in Remote Locations
5. Extracting Secrets with Mimikatz
6. Finding Credentials in Configuration Files
6.1 Unattend.xml
7. IIS Web Config
8. Additional Sources of Passwords
8.1 Wireless Passwords
8.2 Sticky Notes
8.3 PowerShell History
8.4 Registry Searches
Last updated