root@wpad:~/blog/libesedb-20120102# cd esedbtools/root@wpad:~/blog/libesedb-20120102/esedbtools# ./esedbexportesedbexport 20120102Missing source file.Use esedbexport to export items stored in an Extensible Storage Engine (ESE)Database (EDB) fileUsage: esedbexport [ -c codepage ][ -l logfile ][ -m mode ][ -t target ][ -T table_name ][ -hvV ]source source: the source file -c: codepage of ASCII strings, options: ascii, windows-874, windows-932, windows-936, windows-1250, windows-1251, windows-1252 (default), windows-1253, windows-1254 windows-1255, windows-1256, windows-1257 or windows-1258 -h: shows this help -l: logs information about the exported items -m: export mode, option: all, tables (default)'all' exports all the tables or a single specified table with indexes,'tables' exports all the tables or a single specified table -t: specify the basename of the target directory to export to(default is the source filename) esedbexport will add the suffix .export to the basename -T: exports only a specific table -v: verbose output to stderr -V: print versionroot@wpad:~/blog/libesedb-20120102/esedbtools#root@wpad:~/blog/libesedb-20120102/esedbtools# ./esedbexport ../../ntds.ditesedbexport 20120102Opening file.Exporting table 1 (MSysObjects) out of 12.Exporting table 2 (MSysObjectsShadow) out of 12.Exporting table 3 (MSysUnicodeFixupVer2) out of 12.Exporting table 4 (datatable) out of 12.Exporting table 5 (hiddentable) out of 12.Exporting table 6 (link_table) out of 12.Exporting table 7 (sdpropcounttable) out of 12.Exporting table 8 (sdproptable) out of 12.Exporting table 9 (sd_table) out of 12.Exporting table 10 (MSysDefrag2) out of 12.Exporting table 11 (quota_table) out of 12.Exporting table 12 (quota_rebuild_progress_table) out of 12.Export completed.
Move the exported tables to somewhere a bit easier:
root@wpad:~/blog# cd NTDSXtract 1.0/root@wpad:~/blog/NTDSXtract 1.0# lsdscomputers.py dsdeletedobjects.py dsfileinformation.py dsgroups.py dstimeline.py dsusers.py framework ntdsroot@wpad:~/blog/NTDSXtract 1.0# python dsusers.pyDSUsersExtracts information related to user objectsusage: dsusers.py [option] options: --rid List user identified by RID --name List user identified by Name --passwordhashes Extract password hashes --passwordhistory Extract password history --certificates Extract certificates --supplcreds Extract kerberos keys --membership List groups of which the user is a memberroot@wpad:~/blog/NTDSXtract 1.0#