Dump usernames and hashed passwords from the SAM using Crackmapexec

/static/assets/terminal-logo.svg/static/assets/windows-logo.svg
Adversaries may try to obtain credentials from the Security Account Manager (SAM) database. The SAM is a database file that contains the host's local accounts, which are generally discovered with the net user command. Enumerating the SAM database requires SYSTEM access. In this TTP, we will dump the SAM database using known valid credentials or a user+pass list.
locked
View Command

To view this TTPs command, you must be logged in with a professional or enterprise license.

Login

Test this TTP

Download Operator (1.7.1)
Test this TTP using one of our Operator chains
Is my host protected against Crackmapexec?

2023-02-07

/static/assets/windows-logo.svg/static/assets/linux-logo.svg/static/assets/apple-logo.svg
Deploy Crackmapexec to dump SAM and LSA and execute system commands