Windows PW

REF: PrivEscWindows-PasswordPwdump

1: C:\windows\system32\config\**SAM** (Registry: HKLM/SAM)
2: System memory

The SAM file is mounted in the registry as: HKLM/SAM
Windows locks this file, and will not release the lock unless it's shut down.
However, if you look at the SAM entry in the aforementioned registry section, you will not find the hash.
Seems more than likely that the hash, or password, will also be stored in memory. 
In fact, there are quite a few password crackers that take your password directly from memory.

Also:
In memory, '**lsass**' holds on to a plaintext copy of the password for whoever is logged in

A 'badUSB' device can grab the hash (ex: Rubber ducky, Malduino, P4wnP1)


Domain Machine:
HKEY_LOCAL_MACHINE\Security\Cache

SAM file needs both:
C:\windows\system32\config\SAM
C:\windows\system32\config\system

Registry
HKEY_LOCAL_MACHINE\Security\Cache  .. for domain credentials
HKEY_LOCAL_MACHINE\SAM             .. for local credentials

In-memory (dump with mimikatz)
However this last one isn't "stored" as in written-to-disk

Last updated