Volume Shadow Copy Service

Resources

  1. Shadow copy creation tools

a. VShadow

b. Win32_ShadowCopy Create method

c. vssadmin create shadow

Create shadow copy

Refer to the resources links above for more client tools for shadow copy creation (**not tested)

C:\Users\Administrator> wmic shadowcopy call create Volume='C:\'

List shadow copy

C:\Users\Administrator> vssadmin list shadows

The output of the shadow copy volume (of C:\ ) will be shown. We can now access the SAM and system registry files from the windows\system32\config\sam and windows\system32\config\system respectively.

Now that we have the extracted credentials from the SAM and system registry hives, we can use Impacket's secretsdump.py script to decrypt it. Refer to the example from Registry Hives section for more information.

Last updated