Windows Domain Controller Hashdump

2015-05-04T20:07:27
ID MSF:POST/WINDOWS/GATHER/CREDENTIALS/DOMAIN_HASHDUMP
Type metasploit
Reporter Rapid7
Modified 2017-11-15T20:06:36

Description

This module attempts to copy the NTDS.dit database from a live Domain Controller and then parse out all of the User Accounts. It saves all of the captured password hashes, including historical ones.