Local SAM Dump
Last updated
Was this helpful?
Last updated
Was this helpful?
If we have access to a windows.old
directory or an old Windows backup, we can extract the SYSTEM
and SAM
registry hives to perform offline credential dumping:
The SAM
hive contains encrypted NTLM password hashes for local user accounts
The SYSTEM
hive holds the boot key required to decrypt them.
This technique is conceptually the same as using , which performs the same operation but directly on a live system.