MDF
This module creates a Volume Shadow Copy of the running MSSQL database, allowing the master.mdf file to be safely copied even while in use. It then extracts the login password hashes found within the master database ready to be cracked with hashcat.
Based on Invoke-MDF: https://github.com/The-Viper-One/Invoke-DumpMDF Which is based on the original work of XPN: https://github.com/xpn/Powershell-PostExploitation/blob/master/Invoke-MDFHashes/Get-MDFHashes.ps1
Supported Methods
SMB
SessionHunter (WMI)
WMI
WinRM
Parameter
Value
Description
-ShowOutput
N/A
Displays each targets output to the console
-SuccessOnly
N/A
Display only successful results
Usage
Last updated
Was this helpful?