Dump usernames and hashed passwords from the SAM using Crackmapexec
Adversaries may try to obtain credentials from the Security Account Manager (SAM) database. The SAM is a database file that contains the host's local accounts, which are generally discovered with the net user command.
Enumerating the SAM database requires SYSTEM access. In this TTP, we will dump the SAM database using known valid credentials or a user+pass list.
To view this TTPs command, you must be logged in with a professional or enterprise license.Login
Test this TTP
Download Operator (1.7.1)