Pentest
search
⌘Ctrlk
Pentest
  • Homepage
  • Pentest Links
  • 01 Prep
  • 02 Scan
  • 03 Getting In
  • 04 WebApps
  • 05 Passwords & Ciphers
  • 06 Linux PrivEsc
  • 07 Windows PrivEsc
    • 1 Windows cmd kungfu
    • 2 Enums
    • 3 PrivEsc
    • 4 Kernel Exploits
    • 5 Looting
    • Bloodhound
    • DLL Hijack MSF
    • Kerberos
    • Memory Analysis
    • NTDS
    • Powershell
    • Responder
    • Saved Creds runas
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. 07 Windows PrivEsc

5 Looting

hashtag
After system/admin:

  1. Go for sam dump on windows using reg.exe https://xapax.github.io/security/#attacking_active_directory_domain/active_directory_privilege_escalation/credential_extraction/#extract-credentials-from-sam-and-security-hives-from-registryarrow-up-right

  2. REF:

    1. https://github.com/mubix/post-exploitation-wikiarrow-up-right

Previous4 Kernel Exploitschevron-leftNextBloodhoundchevron-right

Last updated 2 years ago