Skip to content

SMBRegDump2 Attack

The SMBRegDump2 Attack is a modified version of SMBRegDump that leverages the Remote Registry Service on Windows systems to remotely access and parse registry hives over SMB. Unlike SMBRegDump, this attack does not create any files on the disk. Instead, it modifies the security descriptor of protected registry keys to grant temporary access, reads the keys remotely, and then restores the original permissions.

This approach enables the extraction of SAM, SYSTEM, and SECURITY secrets, such as local account hashes, without leaving artifacts on the disk. If local account hashes are successfully extracted, they will be automatically added to the Credentials Window in OctoPwn for further lateral movement steps.

This attack works because, by default, local administrators have write access to modify the security descriptors of registry keys, even if they cannot read the keys initially.


Parameters

Normal Parameters

credential

Specifies the ID of the credential to use for authentication on the target. This needs to be a local admin.

targets

Specifies the list of targets to scan.

A list of targets can be specified in the following formats:

  • ID: ID of the target server from the Targets Window.
  • IP: Single IP address (e.g., 192.168.1.1).
  • CIDR: IP range in CIDR notation (e.g., 192.168.1.0/24).
  • Hostname: Resolvable hostname.
  • File: Path to a file containing targets (must be in OctoPwn’s /browserefs/volatile directory). File lists need to be uploaded into OctoPwn and separated by newlines.
  • Control word: Use all to scan all stored targets.

srvwaittime

Defines the maximum time (in seconds) to wait for a server response before giving up.

Advanced Parameters

authtype

Specifies the authentication protocol to use (e.g., NTLM).

dialect

Specifies the SMB connection dialect (e.g., SMB2).

krbetypes

Defines the Kerberos encryption types to use during authentication.

krbrealm

Specifies the Kerberos realm for authentication, if applicable.

maxruntime

Sets the maximum runtime for the attack.

proxy

Specifies the proxy ID to use for routing the attack.

resultsfile

Specifies the path for saving scan results.

showerrors

Determines whether to display errors encountered during the scan.

timeout

Sets the timeout in seconds for each target.

workercount

Specifies the number of parallel workers for the attack.