githubEdit

Credentials Dumping

Credentials Dumping

The following examples use a username and plaintext password, although user/hash combos work as well.

Dump SAM

Dump SAM hashes using methods from secretsdump.py

You need at least local admin privilege on the remote target, use option --local-auth if your user is a local account

nxc smb 192.168.1.0/24 -u UserNAme -p 'PASSWORDHERE' --sam

Dump LSA

Dump LSA secrets using methods from secretsdump.py

Requires Domain Admin or Local Admin Privileges on target Domain Controller!

nxc smb 192.168.1.0/24 -u UserNAme -p 'PASSWORDHERE' --lsa

Dump NTDS.dit

Requires Domain Admin or Local Admin Privileges on target Domain Controller

2 methods are available:

(default) drsuapi - Uses drsuapi RPC interface create a handle, trigger replication, and combined with additional drsuapi calls to convert the resultant linked-lists into readable format

vss - Uses the Volume Shadow copy Service


TIP: You can also DCSYNC with the computer account of the DC

There is also the ntdsutil module that will use ntdsutil to dump NTDS.dit and SYSTEM hive and parse them locally with secretsdump.py

Dump LSASS

You need at least local admin privilege on the remote target, use option --local-auth if your user is a local account

Using Lsassy

Using the module Lsassy from @pixis you can dump remotely the credentials

Using nanodump

Using the module nanodump you can dump remotely the credentials

Using Mimikatz (Deprecated)

You need at least local admin privilege on the remote target, use option --local-auth if your user is a local account

Using the module Mimikatz, the powershell script Invoke-mimikatz.ps1 will be executed on the remote target

Dump WiFi password

You need at least local admin privilege on the remote target, use option --local-auth if your user is a local account

Get the WIFI password register in Windows

Dump KeePass

You can check if keepass is installed on the target computer and then steal the master password and decrypt the database!

Dump DPAPI

You can dump DPAPI credentials using NetExec using the following option --dpapi. It will get all secrets from Credential Manager, Chrome, Edge, Firefox. --dpapi support options :

  • cookies: Collect every cookies in browsers

  • nosystem: Won't collect system credentials. This will prevent EDR from stopping you from looting passwords

You need at least local admin privilege on the remote target, use option --local-auth if your user is a local account

Dump Winlogon registration data

Dump Stored Credentials from mRemoteNG Configuration

Dump PuTTY Private Keys

View the Dumped Key locally

Dump Notepad++ Session Logs

Dump Powershell Command History

Dump WinSCP configuration files

Dump VNC passwords

Dump Backup Operators Permission (SAM, SYSTEM and SECURITY hives)

Automate the process using this module if the target user belongs to the group Backup Operators

Last updated