776 links
  • Shared Bookmarks
  • Home
  • Login
  • RSS Feed
  • ATOM Feed
  • Tag cloud
  • Picture wall
  • Daily
Links per page: 20 50 100
  • thumbnail
    Extracting Password Hashes from the Ntds.dit File | Insider Threat Blog
    • Use Volume Shadow Copies via the VSSAdmin command
    • Leverage the NTDSUtil diagnostic tool available as part of Active Directory
    • Use the PowerSploit penetration testing PowerShell
    • Leverage snapshots if your Domain Controllers are running as virtual machines
      secretsdump.py (Impacket)
    October 22, 2019 at 10:12:00 AM UTC - permalink -
    QRCode
    - https://blog.stealthbits.com/extracting-password-hashes-from-the-ntds-dit-file/
    ad active directory ntds.dit ntds dump
Links per page: 20 50 100
Shaarli - The personal, minimalist, super fast, database-free, bookmarking service by the Shaarli community - Help/documentation