module

NTDS Grabber

Disclosed
N/A
Created
2018-06-14

Description

This module uses a powershell script to obtain a copy of the ntds,dit SAM and SYSTEM files on a domain controller.
It compresses all these files in a cabinet file called All.cab.

Author

Koen Riepe (koen.riepe Koen Riepe (koen.riepe@fox-it.com)

Platform

Windows

Architectures

x86, x64

Module Options

To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:


msf > use post/windows/gather/ntds_grabber
msf post(ntds_grabber) > show actions
...actions...
msf post(ntds_grabber) > set ACTION < action-name >
msf post(ntds_grabber) > show options
...show and set options...
msf post(ntds_grabber) > run

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.