O
O
OSCP Notes
Search
⌃K
Introduction
Port scanning
Passive Information Gathering
Ports enum:
Recon Tools
Tech Skills Needed
msfvenom
meterpreter commands
Web Apps
python scripts
Windows hacks
Transferring files through RDP share
ASP
Port 161:SNMP - SNMPwalk to discover VPN key(PSK)
Directory Traversal Cheatsheet
uploading a file to IIS
How to get a stable shell on windows
Electron App (decompile and find secrets!)
RDP Brute forcing
evilwinrm
print nightmare
Word Object linking (client-side)
Have access to backup SAM & SYSTEM files?
Port Forwarding
Reverse shells
Binary exploitation
Transfering Modules
Buffer Overflow
Cracking!
shellshock
Active Directory
Antivirus Evasion
Windows Priv Esc
Linux Priv Esc
Active Directory Case Studies
Pivoting
C program analysis
Misc
Hack the box Write-ups
THM Offensive Security Path
Proving Ground
Cyber Sec Labs
Powered By GitBook

Have access to backup SAM & SYSTEM files?

​
  • Windows: If you have access to backup SAM & SYSTEM files, you should download them to kali and crack them with samdump2 and crack the NTLM hashes with hashcat.
samdump2 SYSTEM.OLD SAM.OLD > hashes.txt
hashcat -m 1000 hashes.txt ~/rockyou.txt
Previous
Word Object linking (client-side)
Next
Port Forwarding
Last modified 10mo ago
Copy link