CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutSign UpSign In
rapid7

Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.

GitHub Repository: rapid7/metasploit-framework
Path: blob/master/documentation/modules/post/windows/gather/hashdump.md
Views: 11789

The post/gather/hashdump module functions similarly to Meterpreter's built-in hashdump command.

Having this feature as a post module allows it to be used in different penetration testing scenarios.

Vulnerable Application

To be able to use post/gather/hash_dump, you must meet these requirements:

  • You are on a Meterpreter type session.

  • The target is a Windows platform.

  • It must be executed under the context of a high privilege account, such as SYSTEM.

Verification Steps

Please see Overview for usage.

Scenarios

Upgrading to Meterpreter

To be able to use this module, a Meterpreter session is needed. To upgrade to a Meterpreter session, the easiest way is to use the post/multi/manage/shell_to_meterpreter module. Or, you can try:

  1. Use the exploit/multi/script/web_delivery module.

  2. Manually generate a Meterpreter executable, upload it, and execute it.

High Privilege Account

Before using post/gather/hashdump, there is a possibility you need to escalate your privileges.

There are a few common options to consider:

  • Using a local exploit module. Or use Local Exploit Suggester, which automatically informs you which exploits might be suitable for the remote target.

  • The getsystem command in Meterpreter.

  • Stolen passwords.

Hashdump From Multiple Sessions

One major advantage of having hashdump as a post module is you can run against it multiple hosts easily. To learn how, refer to Overview for usage.