Fact-checked by Grok 2 weeks ago

Security Account Manager

The Security Account Manager (SAM), introduced in , is a database component in Windows operating systems that stores and manages local user accounts, security groups, and associated credentials, such as usernames and hashed passwords, to facilitate and for access to local resources. SAM operates as a account store on individual Windows devices, distinct from domain-based directories like , and is responsible for creating default built-in accounts—such as and —during the system's initial boot process. These accounts are assigned unique Security Identifiers (SIDs) in the format S-1-5-21-<ComputerIdentifier>-<Relative Identifier (RID)>, with predefined RIDs like 500 for and 503 for DefaultAccount, enabling precise over permissions and rights on the local machine. Key aspects of SAM include its role in enforcing local policies, such as rights assignments and group memberships, which determine to files, services, and features without network dependencies. For remote administration, the SAM Remote Protocol (MS-SAMR) provides a standardized for client-to-server communication, allowing IT administrators to query, create, modify, or delete and group objects across networked Windows environments. This protocol supports essential operations like enumeration of accounts and replication of security descriptors, ensuring consistent in standalone or workgroup configurations. As a critical element, SAM's database is protected by the Local Security Authority (LSA) subsystem, which manages authentication using hashed passwords, such as NTLM hashes, and protects the database through access controls, encryption, and auditing. While primarily used in non-domain-joined scenarios, SAM integrates with broader Windows models, underscoring its foundational importance in endpoint protection and .

Overview

Definition and Purpose

The Security Account Manager (SAM) is a database in Windows NT-family operating systems that stores local user accounts, groups, and security descriptors. It functions as a key component of the local security subsystem, maintaining the necessary information for identifying and authorizing users on a single computer. Introduced with , the SAM replaced the legacy user files used in earlier systems like , providing a more integrated and secure method for handling local account data. The primary purpose of the SAM is to enable local authentication, authorization, and management of non-domain user credentials on standalone or domain-joined systems. It supports essential functions such as verifying user identities during logon, assigning user rights to control access to system resources, and enforcing password policies for local accounts, including requirements for complexity and expiration. Passwords in the SAM are stored using hashing mechanisms to protect credential integrity, though specific details on these processes are addressed elsewhere. Unlike , which manages domain-wide accounts across networked environments, the SAM exclusively handles local accounts and is not used for domain authentication. This distinction ensures that local systems can operate independently for user management while integrating with broader domain structures when needed. On domain controllers, the SAM still exists but primarily serves local administrative functions, deferring domain account handling to .

History

The Security Account Manager (SAM) was introduced with in as a core component of the security model, designed to enable secure local authentication in multi-user environments by storing user account information and hashed passwords in a protected database. Prior to , systems like relied on basic file-based mechanisms for account validation, but this lacked the robust, centralized database structure of SAM, which integrated with the for enhanced access controls. SAM evolved through subsequent releases, including , XP, and Server editions, where it became tightly integrated with the authentication protocol to both local and domain-based logons. In 3 (1997), added functionality to encrypt the SAM database using a system-generated , providing additional against offline attacks by requiring the key for decryption. further advanced this by making NTLMv2 the default (available since NT 4.0 SP4) and prioritizing for domain authentication, reducing reliance on weaker LM hashes while maintaining backward compatibility for local accounts. Significant security enhancements occurred starting with in 2007, when Microsoft deprecated storage of LM hashes by default due to their vulnerability to cracking attacks, shifting focus to stronger NTLMv2 and mechanisms in domain contexts. Full removal of LM hash support followed in and 11, eliminating legacy storage entirely upon password changes and enforcing modern hashing to mitigate offline extraction risks. Key milestones include Microsoft's response to vulnerabilities via security bulletins, such as adaptations for compatibility with older systems through tools like the Diagnostics and Recovery Toolset (DaRT), which allows password resets by accessing the SAM database in recovery environments. Post-2010, hardening efforts emphasized protections against offline attacks, including mandatory stronger encryption and policy restrictions on legacy protocols, ensuring SAM's resilience in contemporary Windows ecosystems.

Technical Architecture

Storage and Location

The Security Account Manager (SAM) database is stored as a registry hive at HKEY_LOCAL_MACHINE\SAM within the , with its underlying data persisted in the located at %SystemRoot%\System32\config\SAM, along with supporting files such as SAM.log for transaction logging and SAM.sav as a backup copy. The related hive, which contains security policies and complements SAM functionality, resides at HKEY_LOCAL_MACHINE\SECURITY and is backed by the file %SystemRoot%\System32\config\SECURITY, including its own .log and .sav files. These hives follow the standard Windows registry file format, consisting of a base block header followed by allocated bins of 4 KB each to accommodate data growth. During system boot, the Windows kernel's Configuration Manager loads the SAM hive into memory. The Local Security Authority Subsystem Service (LSASS.exe) then initializes local authentication services using the loaded data for credential validation without direct file access thereafter. Once loaded, the SAM file becomes locked by the operating system to prevent runtime modifications or extractions, ensuring integrity during active sessions. Access to the SAM hive requires elevated privileges, specifically the SYSTEM account, as standard administrative access is insufficient for reading or modifying its protected subkeys; tools like Registry Editor (regedit.exe) can view it in read-only mode only under these conditions. For recovery purposes, the Volume Shadow Copy Service (VSS) enables creation of point-in-time snapshots of the system volume, allowing access to previous versions of the SAM file even when locked, which facilitates restoration in scenarios like . Additionally, offline copies of the SAM hive can be loaded and edited in environments such as Windows Recovery Environment (WinRE), where regedit can mount the file from a non-booted installation for repair tasks. The typical size of the SAM hive file ranges from approximately 262 KB in minimal configurations to several megabytes, scaling with the number of local user accounts and associated security data.

Data Structure and Components

The Security Account Manager (SAM) database employs a binary registry hive format, consisting of a header followed by fixed-size HBIN blocks (typically 4 KB each) that contain variable-sized CELLs for storing keys, values, and lists. The hive header includes a signature ("regf"), modification timestamps, version information, and offsets to the root key and data blocks, ensuring structural integrity during reads and writes. This layout allows for efficient hierarchical organization, with the SAM mounted under HKEY_LOCAL_MACHINE\SAM in the Windows registry. At the core of the SAM structure is a domain-centric , treating the local as the primary under the root key \SAM\Domains. User accounts reside in \SAM\Domains[Account](/page/Account)\Users, where each subkey is named after the user's Relative Identifier (RID), a 32-bit value appended to the machine's (SID) for unique identification. For example, the built-in account uses RID 500, resulting in a full SID like S-1-5-21---500, while standard user RIDs typically start from 1000. Each user object comprises two primary data s: a "V" (variable-length) holding attributes such as username, full name, description, , and password-related fields including history; and an "F" (fixed-length) containing timestamps for last logon, account lockout duration, failed logon attempts, and total logons since creation. Group memberships are managed through \SAM\Domains\Account\Groups, where local groups like Administrators (RID 544) store member in dedicated value lists, enabling of user privileges. Alias tables under \SAM\Domains\Alias provide SID-to-name mappings for local aliases, facilitating quick without full traversal and supporting across Windows versions. These components collectively theoretical up to approximately 2^31-1 users and groups, limited primarily by RID space and hive file size constraints. The SAM integrates with the Local Security Authority (LSA) policy database in the registry hive, sharing references to secrets and policies like minimum password length via offsets and linked structures. Tools such as registry editors can parse this binary layout by navigating HBIN offsets to extract non-sensitive attributes like account names and .

Authentication and Management

Password Storage Mechanisms

The Security Account Manager (SAM) processes passwords by converting them into hashed representations to avoid storing values, ensuring that credentials remain protected even if the database is accessed. The primary hashing method used is the NT hash, which applies the algorithm to the Unicode representation of the , resulting in a 128-bit (16-byte) value. This unsalted hash is computed directly from the without additional , a design choice that simplifies but introduces risks if the hash is extracted. Historically, SAM also supported the legacy () hash, a weaker mechanism introduced in earlier Windows versions for compatibility with older systems. The LM hash processes the password by converting it to uppercase, truncating or padding it to 14 characters, splitting it into two 7-character halves, and encrypting each half using the () algorithm with a fixed key derived from the characters. This produces two 8-byte DES-encrypted blocks concatenated into a 16-byte hash, which is case-insensitive and limited to 14 characters due to its design constraints. The LM hash has been deprecated and is disabled by default since SP1 and , with modern systems configured via the NoLMHash registry setting to prevent its storage. These hashes are stored within individual objects in the SAM database, specifically under the variable-length "V" value in the registry structure of the SAM hive, where the NT hash occupies a fixed offset and the LM hash (if enabled) follows. No passwords are ever retained in SAM; instead, only these one-way hashes are persisted to support verification during . To enforce password reuse prevention, SAM maintains a of up to 24 previous password hashes per , configurable via the "Enforce password history" policy, allowing the system to reject passwords matching any stored prior hashes. Over time, password storage in has evolved to integrate with enhanced protocols. The NT hash serves as the foundation for (NT ) protocols, where NTLMv1 provides basic challenge-response using the hash to derive responses to server challenges, while NTLMv2 improves security by incorporating stronger session keys, timestamps, and client challenges to mitigate replay and man-in-the-middle attacks. Beginning with and Server 2016, SAM benefits from Credential Guard, a virtualization-based security feature that isolates sensitive credential data—including NT hashes from ()—in a secure enclave, preventing unauthorized access by malicious processes even if they escalate privileges. A core aspect of SAM's password mechanisms is the absence of NT hashing, meaning identical s always yield the same value across accounts, which facilitates offline verification but also enables precomputed attacks if hashes are compromised. Additionally, SAM enforces policies, such as the " must meet complexity requirements" , which requires s to not contain the user's account name or full name and to include characters from at least three of the following four categories: uppercase letters, lowercase letters, base-10 digits, and non-alphabetic characters (e.g., symbols); the minimum length is enforced by a separate with a default of 0 characters (often configured to 6-14 characters). These policies are stored as properties in the SAM database and applied during password changes via APIs like SamQueryInformationDomain. These policies ensure standardized without relying on controllers for accounts.

Local Account Handling

The Security Account Manager (SAM) facilitates the creation of local user accounts through Windows APIs such as NetUserAdd, which adds a new user entry to the SAM database along with specified attributes like username and privilege level. Upon creation, these accounts are automatically assigned to default local groups, such as the Users group for standard accounts or the Guests group for guest accounts, ensuring appropriate baseline permissions without manual group assignment. Account deletion is handled via complementary APIs like NetUserDel, which removes the user entry from the SAM database while preserving any associated group memberships for cleanup if needed. SAM supports key operational features for local accounts, including logon tracking that records the last successful logon and the number of failed logon attempts to aid in monitoring and lockout enforcement. expiration policies can be configured per user, specifying a date after which the becomes inactive, typically set through management tools to enforce temporary . Additionally, functions to disable or enable accounts are available, allowing administrators to temporarily suspend without deletion, such as marking an as inactive to prevent logons while retaining its in SAM. SAM integrates closely with the Local Security Authority () subsystem, where LSA queries SAM during local authentication to validate user credentials and retrieve account details for session initialization. This integration extends to built-in accounts like the , which holds elevated privileges for , and the account, designed for limited, anonymous access and often disabled by default for security reasons. Local accounts in SAM are managed through various tools, including the command-line utility net for operations like adding, modifying, or querying accounts (e.g., net username /add). The graphical interface tool lusrmgr.msc, accessible via Computer Management, provides a console for viewing, creating, and editing local users and groups in a structured . cmdlets from the LocalAccounts module, such as New-LocalUser for creation and Get-LocalUser for querying, enable scripted automation of SAM data modifications on Windows systems. SAM enforces a limit of 20 characters for local usernames to maintain compatibility with legacy systems and protocols, truncating longer names if necessary during account setup. In mixed environments with both local and domain accounts, SAM maintains domain isolation by restricting local accounts to the machine's SAM database, preventing direct overlap or authentication conflicts with Active Directory domain accounts unless explicitly bridged via trust relationships or cached credentials.

Security Protections

Access Controls

The (SAM) hive in the is safeguarded by lists (DACLs) that restrict modifications to highly privileged entities. Specifically, full control over the SAM hive, located at HKEY_LOCAL_MACHINE\SAM, is granted exclusively to the Administrators group and the SYSTEM account, preventing standard users or lower-privileged processes from altering user account data or hashes stored within it. However, in versions 1809 to 20H2, the Users group was granted read access, as highlighted in a . In response to CVE-2021-36934 (HiveNightmare), updated permissions in subsequent builds (e.g., via KB5005565 for version 1809 and later patches) to deny read access to the SAM hive for standard users, restoring restrictions to privileged entities only. This permission model ensures that only elevated administrative actions can interact with SAM contents during runtime, thereby mitigating unauthorized tampering with local security principals. Runtime protections further enforce isolation of SAM data through the Local Security Authority Subsystem Service (LSASS.exe), which loads the SAM database into protected memory spaces inaccessible to non-privileged processes. This process isolation denies direct registry access to applications lacking sufficient privileges, as LSASS operates as a protected process that shields sensitive credential information from memory scraping or injection attacks by untrusted code. On Windows 8.1 and later versions, additional LSA protections explicitly block non-protected processes from reading LSASS memory or injecting code, enhancing the integrity of SAM-loaded data during active sessions. Auditing mechanisms provide oversight for modifications via Windows Audit policies, logging events such as user account creations under Event ID 4720 in the Security log. This event captures details like the new account's (), the responsible subject's account, and the target , enabling administrators to track changes to local SAM accounts on domain controllers, member servers, and workstations. Such logging is activated through the "Audit User Account Management" policy in Group Policy, ensuring traceability without compromising performance. Accessing SAM data, particularly for offline analysis, requires specific user rights assignments like SeBackupPrivilege or SeRestorePrivilege, which bypass standard checks to allow backup and restoration of registry hives including . These privileges enable tools to retrieve file contents even when DACLs would otherwise deny access, but they are typically reserved for backup operators or administrators performing maintenance tasks. For online management of , such as creating or modifying local accounts, (UAC) mandates elevation to full administrative privileges, prompting for credentials to prevent inadvertent or malicious alterations by standard users. These access controls originated with the introduction of enhanced support in , building on the foundational security model of earlier NT versions to provide granular permissions over registry objects like the hive. In and later, extends these protections by allowing administrators to define execution policies that restrict unauthorized applications from interacting with LSASS, thereby limiting potential vectors for data exfiltration through controlled software whitelisting.

Encryption and Integrity Measures

The Security Account Manager (SAM) employs encryption to obfuscate sensitive data within its registry hive, primarily using a boot key derived from values stored in the SYSTEM hive at locations such as HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa\JD, Skew1, GBG, and Data. This boot key serves as the foundation for decrypting the SAM\Domains\Account section, where local user password hashes are stored, preventing straightforward offline access to these hashes. In earlier implementations, the SysKey utility enhanced this protection by optionally requiring a startup password or storing the encryption key on removable media, thereby further scrambling the boot key and making unauthorized decryption more challenging. SysKey was removed in Windows 10 version 1709 and later versions, including Windows 11, as it could be exploited by attackers. In modern Windows versions, the encryption mechanism integrates elements of the (DPAPI) for protecting related system secrets, though the core SAM obfuscation remains tied to the boot key derivation process. The boot key itself is regenerated when is enabled or modified, ensuring that any prior key configurations become invalid and requiring re-authentication for access. This rotation mechanism ties directly to changes in system security settings, maintaining the integrity of the encryption over time. Additionally, the Local Security Authority Subsystem Service (LSASS) leverages secrets—stored in the SECURITY hive and encrypted with an LSA key derived from the same boot key—for session key management during user authentication and policy enforcement. Integrity measures for the SAM hive include built-in checksum validation within the registry hive file headers, which detect corruption or tampering during loading; if the checksum fails, Windows logs an error and may require manual recovery using backups or repair tools. For broader protection, integration with full-volume encryption ensures that SAM files, located in %SystemRoot%\System32\Config, are safeguarded at the disk level, rendering the hive inaccessible without proper decryption of the entire volume using algorithms. A key evolution in encryption strength occurred with , where related secrets adopted AES-256 for enhanced confidentiality, surpassing earlier RC4-based methods and aligning with stronger cryptographic standards for system-wide protections. Notably, while the containing structures in the SAM are encrypted, there is no applied to the password hashes themselves, which remain in hashed form (such as ) within the protected blocks to facilitate without exposing plaintext equivalents.

Vulnerabilities and Exploitation

Historical Cryptographic Weaknesses

The (LM) hash, used by the Security Account Manager (SAM) for password storage in early Windows versions, relies on a weak cryptographic mechanism involving two applications of 64-bit (DES) encryption on halves of the password, rendering it highly vulnerable to attacks. The process converts the password to uppercase, pads it to 14 characters with nulls if shorter, splits it into two 7-byte segments (each serving as a DES key after parity adjustment), and encrypts a fixed 8-byte string ("KGS!@#$%") with each half, producing a 16-byte hash blob without any salt. This design makes the hash case-insensitive, unsalted, and limited to an effective key space of approximately 2^52 possibilities for full 14-character passwords, facilitating rapid brute-force attacks and precomputed lookups. These flaws enabled attackers to extract and crack hashes offline from files, with an 8-character password typically crackable in under one minute using modern hardware and tools like rainbow tables. recognized these risks and issued guidance in 2007 recommending the disablement of hash storage via registry settings or to prevent its generation on password changes. Consequently, hashes were disabled by default starting with in 2007 and fully removed from storage in and , eliminating their presence in new databases. Related issues persisted with the NT hash, computed as an unsalted hash of the Unicode-encoded password, which introduced collision vulnerabilities due to MD4's cryptographic weaknesses and enabled offline cracking using tools such as . The reuse of NT hashes in authentication protocols further facilitated pass-the-hash attacks, where stolen hashes could authenticate without knowing the plaintext password. To address these, promoted the shift to NTLMv2 for , which incorporates salts and stronger challenge-response mechanisms, though SAM storage of the underlying NT hash remained until later enhancements like credential guard in Windows 10.

Modern Attack Vectors

A prominent affecting the Security Account Manager (SAM), CVE-2021-36934 (also known as HiveNightmare or SeriousSAM), stems from overly permissive Access Control Lists (ACLs) on registry hive files including SAM and in versions 1809 and later (including 1909, 2004, 20H2, and 21H1), as well as early builds of up to build 22000. This flaw enables low-privileged users to read these hives directly from the %SystemRoot%\System32\Config directory, exposing hashed credentials without requiring administrative rights, primarily impacting client systems. Discovered and publicly disclosed in July 2021 by independent researchers, the issue allows attackers with local access to extract sensitive data for offline cracking, potentially leading to . More recently, in January 2025, Microsoft addressed CVE-2025-21313, a denial-of-service vulnerability in SAM caused by a deadlock condition triggered by specially crafted requests to the SAM Remote Protocol. This issue affects Windows 10 and Windows 11, rated as Important severity, and can disrupt local authentication services. Exploitation requires network access or local privileges, leading to SAM unavailability until restart or patch application. Contemporary credential dumping techniques targeting SAM often leverage tools like to extract credentials from the Local Security Authority Subsystem Service (LSASS) process memory, where active session hashes and tickets are stored alongside SAM-derived data. Attackers with SeDebugPrivilege can inject into LSASS to retrieve hashes or tickets, enabling pass-the-hash attacks for lateral movement. Offline methods include using reg.exe or reg save commands to export SAM hives from compromised systems, allowing extraction of local account hashes without real-time access. In domain environments, the DCSync technique abuses replication rights to mimic a and pull SAM-equivalent data from remote servers via tools like 's "lsadump::dcsync" module. Additional vectors involve exploiting Volume Shadow Copy Service (VSS) to create unencrypted snapshots of the system volume, bypassing file locks on live SAM hives for dumping via tools like esentutl or ntdsutil. This method proves effective on systems with VSS enabled, as snapshots retain hive contents in a readable state even under protected configurations. Just-In-Time (JIT) administration, intended to grant temporary elevated privileges, can be abused through misconfigurations or insider threats, providing short-lived admin access sufficient to query or export SAM data before privileges expire. Mitigations for these vectors include applying the July 2021 updates (builds 10.0.17763.2114 and later) to correct permissions on affected and 11 systems up to build 22000. For CVE-2025-21313, install the January 2025 patches to resolve the deadlock issue. Enabling protection via (Computer Configuration > Administrative Templates > System > Local Authority > Configure LSASS to run as a protected ) prevents unauthorized memory access to LSASS, blocking Mimikatz-style dumps. Restricting SeDebugPrivilege to trusted processes through policy settings limits debugging-based extractions, while auditing handle requests to SAM paths (Event ID 4656 in logs) and using Sysmon for monitoring (Event ID 11) aids detection. For VSS exploits, disabling non-essential shadow copies via vssadmin or deleting pre-patch snapshots (per KB5005357) reduces exposure. Defender for Endpoint can further enforce reduction rules to block credential dumping behaviors.

References

  1. [1]
    Security Principals | Microsoft Learn
    Jul 11, 2025 · Local user accounts and security groups are stored in and managed by the Security Accounts Manager (SAM) on the local computer.
  2. [2]
    Local Accounts | Microsoft Learn
    Apr 7, 2025 · The account and the group are created during first boot of the machine within the Security Accounts Manager (SAM).
  3. [3]
    Security Account Manager (SAM) Remote Protocol (Client-to-Server)
    Feb 10, 2025 · Specifies the Security Account Manager (SAM) Remote Protocol, which supports management functionality for an account store.
  4. [4]
    Of History & Hashes: A Brief History of Password… - TrustedSec
    May 30, 2015 · LANMAN hashes were included in Windows NT for backwards compatibility with LAN Manager. ... PWL files. Window NT version 3.51 introduced ...
  5. [5]
    Windows Logon Scenarios - Microsoft Learn
    Jul 8, 2025 · SAM protects and manages user and group information in the form of security accounts stored in the local computer registry. The computer can ...Interactive Logon · Local And Domain Logon · Smart Card Logon<|control11|><|separator|>
  6. [6]
    Audit SAM - Windows 10 | Microsoft Learn
    Sep 5, 2021 · Audit SAM, which enables you to audit events that are generated by attempts to access Security Account Manager (SAM) objects.
  7. [7]
    [PDF] System Guide - Bitsavers.org
    ... Microsoft® Windows NTTM. Version 3.1. Microsoft Corporation. Page 3 ... You can run powerful new 32-bit applications created for Windows NT, which. is also ...
  8. [8]
    [MS-NRPC]: Message Processing Events and Sequencing Rules
    Apr 27, 2022 · The NetrLogonSamLogon method updates the user's lastLogon attribute for the Security Account Manager (SAM). Opnum: 2. NetrLogonSamLogoff. The ...
  9. [9]
    Microsoft NTLM - Win32 apps
    Jul 9, 2025 · The domain controller uses the user name to retrieve the hash of the user's password from the Security Account Manager database. It uses ...
  10. [10]
    How to use the SysKey utility to secure the Windows Security ...
    Note The Microsoft Windows NT 4.0 SAM database was not encrypted by default. You can encrypt the Windows NT 4.0 SAM database by using the SysKey utility.
  11. [11]
    Enable NTLM 2 authentication - Windows Client | Microsoft Learn
    Jan 15, 2025 · To enable a Windows 95, Windows 98, or Windows 98 Second Edition client for NTLM 2 authentication, install the Directory Services Client.
  12. [12]
    Active Directory Hardening Series - Part 1 – Disabling NTLMv1
    Sep 21, 2023 · Windows stopped generating the LM Hash (by default) with Vista and Windows Server 2008 so unless the NoLMHash value has been changed, you ...
  13. [13]
    Prevent Windows from storing a LAN Manager (LM) hash of the ...
    Jan 15, 2025 · This article provides three methods to prevent Windows from storing a LAN Manager (LM) hash of your password in Active Directory and local Security Accounts ...
  14. [14]
    Overview of the Tools in DaRT 10 - Microsoft Learn
    Apr 20, 2021 · The Locksmith Wizard lets you set or change the password for any local account on the Windows operating system that you are analyzing or ...Missing: SAM | Show results with:SAM
  15. [15]
    Syskey.exe utility is no longer supported - Windows Server
    Jan 15, 2025 · The syskey.exe utility and its underlying support in the Windows OS was first introduced in Windows 2000 and backported to Windows NT 4.0.
  16. [16]
    Registry Hives - Win32 apps | Microsoft Learn
    Jan 7, 2021 · Most of the supporting files for the hives are in the %SystemRoot%\System32\Config directory. These files are updated each time a user logs on.
  17. [17]
    Windows registry information for advanced users - Microsoft Learn
    Jan 15, 2025 · The supporting files for HKEY_CURRENT_USER are in the %SystemRoot%\Profiles\Username folder. The file name extensions of the files in these ...
  18. [18]
    Credentials Processes in Windows Authentication - Microsoft Learn
    Jun 30, 2025 · The Security Accounts Manager (SAM) is a database that stores local user accounts and groups. It's present in every Windows operating system; ...
  19. [19]
  20. [20]
    Volume Shadow Copy Service - Win32 apps
    ### Summary: Using VSS for Recovering Registry Hives like SAM
  21. [21]
    Windows Recovery Environment (Windows RE) | Microsoft Learn
    Feb 9, 2023 · Automatic repair and other troubleshooting tools. · From the login screen, click Shutdown, then hold down the Shift key while selecting Restart.Hardware recovery button · Customize Windows RE · Deploy Windows RE
  22. [22]
    Windows 10 CMD backup - Microsoft Q&A
    Jan 15, 2019 · The DEFAULT, SAM and SECURITY files should each be about 262,000 bytes in size. The SOFTWARE file should be about 26,000,000 bytes. The ...Missing: typical | Show results with:typical
  23. [23]
    [PDF] Analysis the Structure of SAM and Cracking Password Base on ...
    Apr 12, 2016 · This paper provides the details about the Security Account Manager(SAM) database and describes how to get the user information from SAM and.
  24. [24]
    Structure of the Registry - Win32 apps - Microsoft Learn
    Jun 2, 2021 · The registry is a hierarchical database that contains data that is critical for the operation of Windows and the applications and services that run on Windows.
  25. [25]
    Security Identifiers - Microsoft Learn
    Jun 26, 2025 · This article describes how security identifiers (SIDs) work with accounts and groups in the Windows Server operating system.
  26. [26]
    Security Account Manager (SAM) Database - Threat Hunter Playbook
    The Security Account Manager (SAM) is a database that is present on computers running Windows operating systems that stores user accounts and security ...
  27. [27]
    [MS-AUTHSOD]: Overview - Microsoft Learn
    Oct 30, 2024 · In Windows, an Active Directory database maintains the domain security principals, whereas the security account manager (SAM) built-in database ...
  28. [28]
    Passwords technical overview | Microsoft Learn
    Jul 29, 2021 · ... LAN Manager one-way function (LM OWF) and as the NT OWF. "One-way ... The NT OWF is used for authentication by domain members in both Windows NT ...
  29. [29]
    Windows passwords salting - Microsoft Q&A
    Jun 24, 2024 · Password hashes for local accounts are stored in the Security Account Manager (SAM) database. The SAM database is located in the Windows ...Is it possible to synchronize the Windows's SAM Password to local ...Applying Policy "Do not Store LAN Manager Hash Value on Next ...More results from learn.microsoft.com
  30. [30]
    Protecting Privileged Domain Accounts: LM Hashes: The Good, the ...
    Feb 29, 2012 · Unfortunately, we do not have a Microsoft-provided mechanism for disabling the LM hash in memory. So for accounts you use for interactive logons ...<|control11|><|separator|>
  31. [31]
    Retrieving NTLM Hashes and what changed in Windows 10
    Jan 21, 2018 · Since July 2016 (Windows 10 v1607), hashes are no longer encrypted with RC4 but are using an AES Cipher. Also all usage of “MD5” is gone. Watch ...<|control11|><|separator|>
  32. [32]
    Enforce password history - Windows 10 | Microsoft Learn
    Apr 18, 2017 · Set Enforce password history to 24. This setting will help mitigate vulnerabilities that are caused by password reuse. Set Maximum password age ...
  33. [33]
    NTLM overview in Windows Server - Microsoft Learn
    Apr 18, 2025 · NTLM is a family of authentication protocols using a challenge-response mechanism. It's used in workgroups and local logons, and is still ...Missing: enhancements | Show results with:enhancements
  34. [34]
  35. [35]
    How to programmatically check the "Password must meet complexity ...
    Jul 16, 2015 · Use SAM APIs (SamQueryInformationDomain) to check password complexity. The DOMAIN_PASSWORD_COMPLEX flag (0x00000001) in PasswordProperties ...
  36. [36]
    NetUserAdd function (lmaccess.h) - Win32 apps - Microsoft Learn
    Oct 12, 2021 · The following code sample demonstrates how to add a user account and assign a privilege level using a call to the NetUserAdd function.
  37. [37]
    User Functions - Win32 apps | Microsoft Learn
    Aug 19, 2020 · The network management user functions control a user's account in the security database, which is the security accounts manager (SAM) database.
  38. [38]
    How to manage local users and groups in Windows with lusrmgr.msc
    Oct 4, 2025 · How to manage user accounts and groups in Windows, using the Local Users and Groups tool (lusrmgr.msc) in Computer Management.<|separator|>
  39. [39]
    How to Manage Local Users and Groups using PowerShell
    Jul 9, 2019 · The LocalAccounts module of PowerShell, included in Windows Server 2016 and Windows Server 2019 by default, makes this process a lot simpler.
  40. [40]
    SAM-Account-Name attribute - Win32 apps | Microsoft Learn
    Sep 10, 2024 · This attribute must be 20 characters or fewer to support earlier clients, and cannot contain any of these characters:
  41. [41]
    Summer of SAM - incorrect permissions on Windows 10/11 hives
    Jul 20, 2021 · The only issue here is how do we read those files: when Windows are running, the access to the files is locked and even though we have read ...Missing: runtime | Show results with:runtime
  42. [42]
    Configure added LSA protection - Microsoft Learn
    Mar 26, 2025 · This article explains how to configure added protection for the Local Security Authority (LSA) process to prevent code injection that can compromise ...
  43. [43]
    4720(S) A user account was created. - Windows 10 - Microsoft Learn
    Sep 7, 2021 · This event generates every time a new user object is created. This event generates on domain controllers, member servers, and workstations.
  44. [44]
    Managing Privileges in a File System - Windows drivers
    Apr 24, 2025 · SeBackupPrivilege allows file content retrieval, even if the security descriptor on the file might not grant such access. · SeRestorePrivilege ...
  45. [45]
    [PDF] Password and Network Logon Security in Windows NT 4.0
    It is also responsible for generating and logging of security audit messages. The Security Account Manager (SAM) manages the user and group accounts, and.
  46. [46]
    [DOC] Windows 10 Credential Theft Mitigation Guide
    Additional information is available in the Windows 10 security overview and the AppLocker Design Guide . • Disk encryption to defend against physical loss ...
  47. [47]
    SysKey and the SAM
    Feb 21, 2008 · The Security Accounts Manager, or SAM, has been used by Windows since the days of NT to store information on local user accounts.
  48. [48]
    System key utility technical overview | Microsoft Learn
    Nov 1, 2024 · Describes the system key utility (Syskey), which protects the Security Accounts Manager (SAM) database in Windows operating systems.Missing: boot | Show results with:boot
  49. [49]
    Why is the boot key used to access the encrypted SAM database ...
    May 13, 2024 · The password hashes (and other secrets) in the SAM (and other system-wide locations) are almost certainly encrypted using DPAPI.Missing: Manager | Show results with:Manager
  50. [50]
    Windows secrets extraction: a summary - Synacktiv
    Apr 20, 2023 · LSA secrets are stored in the SECURITY\Policy\Secrets key and are encrypted using the LsaKey which itself is derived from the bootkey. Here as ...
  51. [51]
    Registry troubleshooting for advanced users - Windows Server
    Jan 15, 2025 · Restore the computer to a previous state before registry corruption occurred. · Check the hardware, the disk, the firmware drivers, and the BIOS.Missing: CRC | Show results with:CRC
  52. [52]
    BitLocker Overview - Microsoft Learn
    Jul 29, 2025 · BitLocker is a Windows security feature that provides encryption for entire volumes, addressing the threats of data theft or exposure from lost, stolen, or ...BitLocker Drive Encryption · BitLocker countermeasures · Configure BitLockerMissing: SAM | Show results with:SAM
  53. [53]
    Windows 8.1 AES 256 Encryption issue. - Microsoft Q&A
    Apr 22, 2014 · You can use bit locker to enable AES 256 encryption on windows 8.1. BitLocker Drive Encryption is only available in the Windows 8 Pro and Windows 8 Enterprise ...Enabling AES 128 and 256 On User Accounts - Microsoft Q&AHow to Store AES Encryption Keys Securely in Windows Application?More results from learn.microsoft.com
  54. [54]
    [PDF] LSA secrets in Windows - Passcape Software.
    LSA secrets is a special protected storage for important data used by the Local Security Authority (LSA) in Windows. LSA is designed for managing a system's ...
  55. [55]
    [PDF] Information Security in Systems and Networks - University at Albany
    – LAN Manager hash (LM hash). – Password is padded ... – Each half is encrypted using an 8-byte DES (data encryption ... – Converts password to Unicode and uses MD4 ...
  56. [56]
    Brute Force Search of a DES Keyspace - Cornell University
    Information is displayed on the LCD. description of the photo. The Lan Manager hash or LM hash is one of the formats Microsoft Windows used, prior to Windows ...
  57. [57]
    [PDF] CMSC 426 - Authentication and Passwords
    Windows LM Hash. • LAN Manager Hash (LM Hash). ‣ Pad password to 14 character. ‣ Convert to upper case. ‣ Construct two 7-byte DES keys. ‣ Encrypt fixed string ...<|control11|><|separator|>
  58. [58]
    LM Hash Cracking – Rainbow Tables vs GPU Brute Force - NetSPI
    Oct 6, 2014 · Is it worth using Rainbow Tables for LM hash cracking? Or is it better to just brute force the hashes with GPU password cracking.Missing: DES unsalted
  59. [59]
    [PDF] Mitigating Pass-the-Hash and Other Credential Theft, version 2
    If audit mode is enabled for the Local Security Authority Subsystem (LSASS), an event will be generated when Lsass.exe attempts to load an unauthorized driver.
  60. [60]
    Network security LAN Manager authentication level - Windows 10
    Apr 18, 2017 · The Network security: LAN Manager authentication level setting determines which challenge/response authentication protocol is used for network logons.Missing: Account | Show results with:Account
  61. [61]
  62. [62]
  63. [63]
    Microsoft SAM File Readability CVE-2021-36934 | Rapid7 Blog
    Jul 21, 2021 · ... Security Account Manager (SAM) file on Windows 10 and 11 systems was READ-enabled for all local users. The SAM file is used to store ...
  64. [64]
    OS Credential Dumping, Technique T1003 - MITRE ATT&CK®
    Adversaries may attempt to dump credentials to obtain account login and credential material, normally in the form of a hash or a clear text password.
  65. [65]
    Detecting and preventing LSASS credential dumping attacks
    Oct 5, 2022 · In this blog, we share examples of various threat actors that we've recently observed using the LSASS credential dumping technique.Missing: loads | Show results with:loads
  66. [66]
    OS Credential Dumping: Security Account Manager
    Feb 11, 2020 · Ember Bear acquires victim credentials by extracting registry hives such as the Security Account Manager through commands such as reg save .Missing: first | Show results with:first<|control11|><|separator|>
  67. [67]
    OS Credential Dumping: NTDS, Sub-technique T1003.003 - Enterprise
    Detects credential dumping attempts targeting the NTDS.dit database by monitoring shadow copy creation, suspicious file access to %SystemRoot%\NTDS\ntds.dit, ...Missing: SAM | Show results with:SAM<|control11|><|separator|>
  68. [68]
    HiveNightmare | Protecting Windows 10 SAM from CVE-2021-36934
    Aug 5, 2021 · HiveNightmare is a Windows 10 Local Privilege Escalation vulnerability that is trivial to exploit. Learn how it is used in attacks and how ...
  69. [69]
    Just-in-Time (JIT) Access: What It Is & Why You Need It | BeyondTrust
    Apr 16, 2024 · A just-in-time access model entails eliminating always-on, persistent privileged access, referred to as standing privileges.