📘
DFIR
Ctrlk
  • Networking
    • Networking
  • Windows
    • Administration
    • Forensics
    • Cheat Sheet
    • Investigation
    • Internals
    • Active Directory
    • MISC
      • Offensive Tool Analysis
      • Investigating Specific Activity
      • Dumping Domain Hashes with IFM Images
      • Lateral Movement
      • Advanced Obfuscation
      • SCCM
      • Malware Traffic
  • Linux
    • Forensics
    • SSH
    • Linux WebShells
    • Directories of Interest
    • Internals
  • Enterprise Architecture
    • CI/CD Pipline
    • Citrix
    • Web Applications
    • The Cloud
    • vSphere
    • Containers
    • Troubleshooting
  • Mac
    • Forensics
  • Attacker Information
    • Adversary Operations
    • Actor Playbooks
    • Abused Domains
  • IR Playbook
    • Activity from Unmanaged Host
    • Recommendations
  • Reverse Engineering
    • Python - Pyinstaller
Powered by GitBook
On this page
  1. Windows
  2. MISC

Dumping Domain Hashes with IFM Images

For dumping password hashes

LogoDumping Domain Controller Hashes Locally and Remotely | Red Team Noteswww.ired.team
Dumping Locally and Remotely
LogoDumping Domain Password HashesPenetration Testing Lab
IFM Dumping
LogoHow to Create the IFM Image - WindowsTechnoWindowsTechno
How to Create
PreviousUser Account DeletedNextLateral Movement

Last updated 3 years ago