Decrypt NTDS (aka NT Directory Service) active directory hashes for servers up to windows 2012r2 (rc4) and windows 2016 and up (aes).
NTDS uses the Extensible Storage Engine format (aka ESE).
syntax is NTDSEXTRACT 32_hex_chars_syskey path_to_ntds_db
You can dump all necessary files (registry hives and ntds database) with
powershell "ntdsutil.exe 'ac i ntds' 'ifm' 'create full c:\temp' q q"
check the database with esentutl /g ntds.dit and repair it with esentutl /p ntds.dit.
-
Notifications
You must be signed in to change notification settings - Fork 0
erwan2212/NTDSEXTRACT
Folders and files
Name | Name | Last commit message | Last commit date | |
---|---|---|---|---|
Repository files navigation
About
NTDSEXTRACT
Resources
Stars
Watchers
Forks
Releases
No releases published
Packages 0
No packages published