# Oncle Sam

### Découverte des fichiers

Il y a deux fichiers de registre windows dispo :&#x20;

{% file src="<https://2107662175-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MiRb_VTw-Cu3cwSNhHj%2Fuploads%2FmBtlVHHWK5hDU9xdAlST%2Fsystem.save?alt=media&token=9a26bc7d-6c65-4481-894c-69ce6729fb55>" %}

{% file src="<https://2107662175-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MiRb_VTw-Cu3cwSNhHj%2Fuploads%2FIbbGKRESx4tLqCCft2VT%2Fsam.save?alt=media&token=64fc5909-3182-44d6-ba6a-a7effee63a44>" %}

{% hint style="info" %}
**The Security Account Manager (SAM) is a registry file for Windows XP, Windows Vista, Windows 7, 8.1 and 10 that stores local user's account passwords**.
{% endhint %}

```
file *
sam.save:    MS Windows registry file, NT/2000 or above
system.save: MS Windows registry file, NT/2000 or above
```

Il existe une technique pour extraire les hash NTLM des utilisateurs lorsque l'on a ces deux registres.

### Extractions des hashs

On commence par extraire les hashs des utilisateurs du systèmes via impacket.

```
┌──(kali㉿kali)-[~/Desktop/challenge_sam_password]
└─$ impacket-secretsdump -sam sam.save -system system.save LOCAL
Impacket v0.9.24 - Copyright 2021 SecureAuth Corporation

[*] Target system bootKey: 0x97d0590046fc16af953068aeb5931f6b
[*] Dumping local SAM hashes (uid:rid:lmhash:nthash)
Administrateur:500:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
Invité:501:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
DefaultAccount:503:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
WDAGUtilityAccount:504:aad3b435b51404eeaad3b435b51404ee:36bdb0f8f08dddcb87d4942ee013c49b:::
apssis:1002:aad3b435b51404eeaad3b435b51404ee:c2063e596b98a1a61959976c52702ba4:::
[*] Cleaning up...
```

{% embed url="<https://github.com/SecureAuthCorp/impacket>" %}

Je casse le hash NTLM de l'utilisateur apssis sur crackstation :&#x20;

![](https://2107662175-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MiRb_VTw-Cu3cwSNhHj%2Fuploads%2FqmDuBE5svRPxW35ltdZs%2Fimage.png?alt=media\&token=08af50a7-266e-4e40-a1f3-c1c5765a9569)

Le mot de passe de l'utilisateur apssis est "papanoel".
