Skip to content

Commit a239626

Browse files
authored
Merge pull request HackTricks-wiki#650 from almandin/almandin-patch-1
Update README.md
2 parents a2c9c0e + 9368d21 commit a239626

File tree

1 file changed

+10
-0
lines changed
  • windows-hardening/stealing-credentials

1 file changed

+10
-0
lines changed

windows-hardening/stealing-credentials/README.md

+10
Original file line numberDiff line numberDiff line change
@@ -291,6 +291,16 @@ For **big NTDS.dit files** it's recommend to extract it using [gosecretsdump](ht
291291
292292
Finally, you can also use the **metasploit module**: _post/windows/gather/credentials/domain\_hashdump_ or **mimikatz** `lsadump::lsa /inject`
293293
294+
### **Extracting domain objects from NTDS.dit to an SQLite database**
295+
296+
NTDS objects can be extracted to an SQLite database with [ntdsdotsqlite](https://github.com/almandin/ntdsdotsqlite). Not only secrets are extracted but also the entire objects and their attributes for further information extraction when the raw NTDS.dit file is already retrieved.
297+
298+
```
299+
ntdsdotsqlite ntds.dit -o ntds.sqlite --system SYSTEM.hive
300+
```
301+
302+
The `SYSTEM` hive is optional but allow for secrets decryption (NT & LM hashes, supplemental credentials such as cleartext passwords, kerberos or trust keys, NT & LM password histories). Along with other information, the following data is extracted : user and machine accounts with their hashes, UAC flags, timestamp for last logon and password change, accounts description, names, UPN, SPN, groups and recursive memberships, organizational units tree and membership, trusted domains with trusts type, direction and attributes...
303+
294304
## Lazagne
295305
296306
Download the binary from [here](https://github.com/AlessandroZ/LaZagne/releases). you can use this binary to extract credentials from several software.

0 commit comments

Comments
 (0)