First of all thanks for the two videos about the topics in these scripts, nice work!
I wanted to see if it was possible to extract the required values directly off of an offline Windows installation. I found python-registry which implements reading the registry hives directly out of System32 if the user has read-only access to the required files.
I tested this on a Linux system by mounting the Windows drive to /mnt:
Makes the samreader script runnable as a module entrypoint since running it directly causes import problems — I'm not sure how you were running it
Implements loading all values (LSA key and SAM info) directly off of System32\config\{SAM,SYSTEM}, without going through the annoying PDF print process and registry export.
Hi!
First of all thanks for the two videos about the topics in these scripts, nice work!
I wanted to see if it was possible to extract the required values directly off of an offline Windows installation. I found python-registry which implements reading the registry hives directly out of System32 if the user has read-only access to the required files.
I tested this on a Linux system by mounting the Windows drive to
/mnt
:This PR:
requirements.txt
since it was missingSystem32\config\{SAM,SYSTEM}
, without going through the annoying PDF print process and registry export.