Methodology
Last updated
Last updated
if you have SEBackup Privilege, then you can access any file on the system. the best way is to get sam and system file and download those to your system and get the administrator hash
We can use the Second Method for Domain Joined Machines
Create a file called test.dsh
Upload this file to the target machine and then run the following command
after this you should get ntds.dit file in your current working directory
we also need system file for this to work
after you can use impacket-secretsdump and get the administrator hash.
we can bypass UAC in rdp session in a powershell shell by running the following command