Skip to content

Commit 9368d21

Browse files
authored
Update README.md
Adds reference to ntdsdotsqlite.
1 parent 49fc142 commit 9368d21

File tree

1 file changed

+10
-0
lines changed
  • windows-hardening/stealing-credentials

1 file changed

+10
-0
lines changed

windows-hardening/stealing-credentials/README.md

+10
Original file line numberDiff line numberDiff line change
@@ -291,6 +291,16 @@ For **big NTDS.dit files** it's recommend to extract it using [gosecretsdump](ht
291291
292292
Finally, you can also use the **metasploit module**: _post/windows/gather/credentials/domain\_hashdump_ or **mimikatz** `lsadump::lsa /inject`
293293
294+
### **Extracting domain objects from NTDS.dit to an SQLite database**
295+
296+
NTDS objects can be extracted to an SQLite database with [ntdsdotsqlite](https://github.com/almandin/ntdsdotsqlite). Not only secrets are extracted but also the entire objects and their attributes for further information extraction when the raw NTDS.dit file is already retrieved.
297+
298+
```
299+
ntdsdotsqlite ntds.dit -o ntds.sqlite --system SYSTEM.hive
300+
```
301+
302+
The `SYSTEM` hive is optional but allow for secrets decryption (NT & LM hashes, supplemental credentials such as cleartext passwords, kerberos or trust keys, NT & LM password histories). Along with other information, the following data is extracted : user and machine accounts with their hashes, UAC flags, timestamp for last logon and password change, accounts description, names, UPN, SPN, groups and recursive memberships, organizational units tree and membership, trusted domains with trusts type, direction and attributes...
303+
294304
## Lazagne
295305
296306
Download the binary from [here](https://github.com/AlessandroZ/LaZagne/releases). you can use this binary to extract credentials from several software.

0 commit comments

Comments
 (0)