博客
关于我
强烈建议你试试无所不能的chatGPT,快点击我
Active Directory Password Hash Extraction
阅读量:2434 次
发布时间:2019-05-10

本文共 986 字,大约阅读时间需要 3 分钟。

Just added a tool for offline Active Directory password hash extraction.

It has very basic functionality right now but much more is planned.

Usage is very simple and only requires 2 parameters.

ntds_decode <SYSTEM> <ntds.dit>

SYSTEM is registry hive and ntds.dit is the database, both from a domain controller.

These files are obviously locked so you need to backup using the Volume Shadow Copy Service.

The output format is similar to pwdump and only runs on Windows at the moment.

LM and NTLM hashes are extracted from active user accounts only.

ntds_decode mounts the SYSTEM file so Administrator access is required on the computer you run it on.

If you’re an experienced pen tester or Administrator that would like to test this tool, you can grab from

It’s advisable you don’t use the tool unless you know what you’re doing.

Source isn’t provided at the moment because it’s too early to release.

If you have questions about it, feel free to e-mail the address provided in README.txt

转载地址:http://pzemb.baihongyu.com/

你可能感兴趣的文章
进站画面:1q84音乐电台
查看>>
MFC程序更换XP皮肤
查看>>
SkinSharp使用方法
查看>>
盘点2010年电子书市场
查看>>
How Computers Know What We Want — Before We Do
查看>>
About Recommender Systems
查看>>
jason数据格式
查看>>
金山快盘的安全性太差了
查看>>
KDD Cup2011
查看>>
“相关性”时代的到来
查看>>
OpenCV资料
查看>>
极阅和微精
查看>>
智能Web算法第二版前言和译者序
查看>>
RPC实践(二)JsonRPC实践
查看>>
RPC实践(三)Hessian实践
查看>>
Zookeeper实践(四)zookeeper的WEB客户端zkui使用
查看>>
RPC实践(五)Dubbo实践-服务集群
查看>>
java单元测试Junit实践(一) Junit基础
查看>>
Webservice实践(二)Webservice 客户端开发
查看>>
Webservice实践(三)基于JDK的jax ws进行服务端开发
查看>>