Open insinfo opened 6 years ago
esedbexport -m tables /home/administrator/gitt/ntds.dit
python dsusers.py /usr/local/bin/ntds.dit.export/datatable.4 /usr/local/bin/ntds.dit.export/link_table.7 /usr/local/bin/hashdumpwork1 --syshive /home/administrator/gitt/SYSTEM --passwordhashes --lmoutfile /home/administrator/gitt/lm-out.txt --ntoutfile /home/administrator/gitt/nt-out.txt --pwdformat ophc
I can not get the password hashes from the Windows Server 2012 "ntds.dit" file
commands
in windows Server 2012 cscript vssown.vbs /create c cscript vssown.vbs /list copy \?\GLOBALROOT\Device\HarddiskVolumeShadowCopy1\windows\ntds\ntds.dit copy \?\GLOBALROOT\Device\HarddiskVolumeShadowCopy1\windows\system32\config\SYSTEM
in linux Debian 8 apt-get install libesedb-utils cd /root esedbexport -m tables /root/ntds.dit wget "https://github.com/csababarta/ntdsxtract/archive/e2fc6470cf54d9151bed394ce9ad3cd25be7c262.zip" unzip "e2fc6470cf54d9151bed394ce9ad3cd25be7c262.zip"
python ./ntdsxtract-e2fc6470cf54d9151bed394ce9ad3cd25be7c262/dsusers.py $dir/ntds.dit.export/datatable.4 $dir/ntds.dit.export/link_table.7 $dir/results --passwordhashes --passwordhistory --syshive $dir/SYSTEM --ntoutfile $dir/AD_NT_pass --pwdformat john --lmoutfile $dir/AD_LM_pass
output
...
files "ntds.dit" and "SYSTEM" to download https://drive.google.com/file/d/1NA0sHgmwNKxYGUQy6iyXIqO4E4hTxs9P/view?usp=sharing https://drive.google.com/file/d/1qpCRdytDOYibE-fJvAE2ppMnGgEc0_Hk/view?usp=sharing