From an elevated command prompt on the computer where the sMSA resides, run mimikatz then execute the following commands:
Copy
Ask AI
privilege::debugtoken::elevatelsadump::secrets
In the output, find _SC_{262E99C9-6160-4871-ACEC-4E61736B6F21}_ suffixed by the name of the targeted sMSA. The next line contains cur/hex : followed with the sMSA’s password hex-encoded.To use this password, its NT hash must be calculated. This can be done using a small python script:
To authenticate as the sMSA, leverage pass-the-hash.Alternatively, to avoid executing mimikatz on the host, you can save a copy of the SYSTEM and SECURITY registry hives from an elevated prompt:
Copy
Ask AI
reg save HKLM\SYSTEM %temp%\SYSTEM & reg save HKLM\SECURITY %temp%\SECURITY
Transfer the files named SYSTEM and SECURITY that were saved at %temp% to another computer where mimikatz can be safely executed.On this other computer, run mimikatz from a command prompt then execute the following command to obtain the hex-encoded password: