sam
lsadump::sam
dumps the local Security Account Manager (SAM) NT hashes (cf. SAM secrets dump). It can operate directly on the target system, or offline with registry hives backups (for SAM
and SYSTEM
). It has the following command line arguments:
/sam
: the offline backup of the SAM hive/system
: the offline backup of the SYSTEM hive
LM and NT hashes are used to authenticate accounts using the NTLM protocol. These hashes are often called NTLM hash and many documentations, resources, blogpost and tools mix terms. In this case, "NTLM" refers to the NT hash.
This command requires elevated privileges (by previously running privilege::debug or by executing Mimikatz as the NT-AUTHORITY\SYSTEM
account).
Dumping the target
Offline dumping
At first a backup ofSYSTEM
and SAM
hives must be obtained:
A Volume Shadow Copy / BootCD can also be used to backup these files:
Then the saved backups of SYSTEM
and SAM
hives can also be used offline:
Last updated