Pentest
Search...
Ctrl
K
07 Windows PrivEsc
5 Looting
Previous
4 Kernel Exploits
Next
Bloodhound
Last updated
2 years ago
Was this helpful?
After system/admin:
Go for sam dump on windows using reg.exe
REF:
https://xapax.github.io/security/#attacking_active_directory_domain/active_directory_privilege_escalation/credential_extraction/#extract-credentials-from-sam-and-security-hives-from-registry
https://github.com/mubix/post-exploitation-wiki