 I produced a couple of blog posts about the Active Directory database file and tds.dit and I show how you can extract the hashes and how you can crack the hashes. So this is the first post where I published the database. Here at the bottom here you can download the sample database. And I showed you how to crack this with the tools installed on Kali. But this time here in this video I'm going to show you how you can extract the hashes from this database with impact from core security. So first let's get the database like this. We have the database and here is our program. We unzip the database which gives us two files. So the database file and the system hive registry hive. So now we can start secrets dump. Option and tds takes the database. That's one dash. Option system stays a system registry hive. We want the output in a files result. And then you have to provide local like this. So as you can see the LM hash and the MTLM hash will be extracted. And here we already have them for administrator the LM hash and the NTLM hash. And here we have them for all the users that I created. Here you have the outputs result.ntds. This contains the hashes. So it's not exactly the same output format as the one I produced in my second blog post about this subject. But here you have the LM hashes and here we have the NTLM hash. So you can change the format to make it suitable for Ashcat or John Ripper. And then here you have also clear text and Kerberos extracts. But yes, you can see these are zero. Now if you install impact it. Then you have an example program secrets dumps. That's what I used here. Now secrets dumps has also a couple of dependencies. You need to install PyCrypto like this. And also PyAsn1 like this.