PowerShell AD Hash Copy
- by Vince
-
in Blog
-
Hits: 1241
I wrote a post a awhile back on how to retrieve and crack active directory hashes but the entire process is manual. I had this bright idea that I'd automate the Windows side of it using PowerShell. In my mind, I had the general flow -- create a directory for the files, create a shadow copy, copy the ntds.dit file from the shadow copy, expert SYSTEM from the registry, and then clean up the mess after I get my files. Funny thing happened, the part where I copy from the shadow copy didn't work. Turns out, PowerShell doesn't all you (or doesn't easily allow you) to access the shadow copy.