In this video I show an alternative to my blogpost on extracting hashes from the Active Directory database file ntds.dit.
I use secretsdump.py from Core Security’s impacket Python modules. The advantage is that this is a pure Python solution, and that it was able to automatically select the correct object ID. Dependencies are pycrypto and pyasn1.
[…] Video: ntds.dit: Extract Hashes With secretsdump.py […]
Pingback by Overview of Content Published In July | Didier Stevens — Monday 1 August 2016 @ 0:01
Why are my LMHASHs and NTHASHs coming out of secretsdump 33 characters long? Where else can I ask this question?
Comment by Bob — Monday 13 February 2017 @ 15:46
You can check the Github: https://github.com/CoreSecurity/impacket/blob/master/examples/secretsdump.py
Comment by Didier Stevens — Monday 13 February 2017 @ 16:28
[…] extract password history from ntds.dit with secretsdump.py, use option […]
Pingback by Practice ntds.dit File Part 9: Extracting Password History Hashes | Didier Stevens — Friday 3 March 2017 @ 0:00
[…] Video: ntds.dit: Extract Hashes With secretsdump.py […]
Pingback by Practice ntds.dit File Overview | Didier Stevens — Friday 3 March 2017 @ 9:43