aka SeriousSam. Exploit allowing you to read any registry hives as non-admin.
An exploit for HiveNightmare, discovered by @jonasLyk, PoC by @GossiTheDog, powered by Porgs
Appears to work on all supported versions of Windows 10, where System Protection is enabled (should be enabled by default in most configurations).
The permissions on key registry hives are set to allow all non-admin users to read the files by default, in most Windows 10 configurations. This is an error.
Allows you to read SAM data (sensitive) in Windows 10.
This exploit uses VSC to extract the SAM even when in use, and saves the SAM in current directory as SAM-haxx, for use with whatever cracking tools, or whatever, you want.
- Currently only looks for the first four system recovery snapshots.
- Haven't added support for dumping SECURITY, SYSTEM etc registry hives yet as I can't be bothered.