Dump usernames and hashed passwords from the SAM using Crackmapexec

Adversaries may try to obtain credentials from the Security Account Manager (SAM) database. The SAM is a database file that contains the host's local accounts, which are generally discovered with the net user command. Enumerating the SAM database requires SYSTEM access. In this TTP, we will dump the SAM database using known valid credentials or a user+pass list.
View Command

To view this TTPs command, you must be logged in with a professional or enterprise license.


Test this TTP

Download Operator (1.7.1)
Test this TTP using one of our Operator chains
Is my host protected against Crackmapexec?


Deploy Crackmapexec to dump SAM and LSA and execute system commands