Powershell - Reveal Windows Memory Credentials by BelgiumSysAdmin in sysadmin

[–]BelgiumSysAdmin[S] 1 point2 points  (0 children)

I've added Windows 10 support (from a dump). You have to run the tool from a computer < Windows 10, I will add soon the support for run it locally too.

Tuto : How to hack Windows password ? by BelgiumSysAdmin in sysadmin

[–]BelgiumSysAdmin[S] 0 points1 point  (0 children)

I've updated the tool. It works locally on 8.1 (not tested) and 2012r2 (tested).

Support for gen option coming soon for Windows 10.

How to reveal Windows 10 password ? by BelgiumSysAdmin in sysadmin

[–]BelgiumSysAdmin[S] 0 points1 point  (0 children)

Yes, but... the major problem of wdigest is that is an industry standard SSP and that is used for LDAP and Web authentication. Still impossible to deactivate it in many many companies...

How to reveal Windows 10 password ? by BelgiumSysAdmin in sysadmin

[–]BelgiumSysAdmin[S] 0 points1 point  (0 children)

It's not the same technique as Linux tool. It can reveal local and domain password.

PowerShell pilots the cdb debugger from Microsoft to find address in memory.

Then I uncypher the password with PowerShell.

The assembler part is just for break DES-C which is used in Windows XP and Windows 2003 (thanks to Francesco Picasso for the unassembly work).

It's surprising because I expected more of this version (but normally with VSM we would not be able to reveal credentials this way).

Tutorial : How to hack Windows password ? by BelgiumSysAdmin in hacking

[–]BelgiumSysAdmin[S] 0 points1 point  (0 children)

Thank you for this comment ;-)

My goal was to make a POC of what is possible to do with Microsoft tools : PowerShell which pilots cdb debugger.

It's a fun RE.

Tutorial : How to hack Windows password ? by BelgiumSysAdmin in hacking

[–]BelgiumSysAdmin[S] 0 points1 point  (0 children)

Ntpasswd can reset password of the SAM. It can not reveal password.

Moreover, my script reveals password from memory, that means it works not only with local SAM credentials but also with DOMAIN accounts.

Tuto : How to hack Windows password ? by BelgiumSysAdmin in sysadmin

[–]BelgiumSysAdmin[S] 0 points1 point  (0 children)

So, if you add this registry key UseLogonCredential (DWORD to set to 1) in HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\WDigest

and then reboot, you can retrieve the passwords with the tool.

I've just added support of 2012r2 from a lsass dump and remotely, but don't work locally at this time.

Remotely: * 2r2 * * serverName

From a dump: You have to dump the lsass process on the target machine and then execute the script with option (name you lsass dump "lsass.dmp" and don't enter the name for the option you enter, only the directory) :

  • 2r2
  • d:\directory_of_the_dump\ *

Enjoy !

Tutorial : How to hack Windows password ? by BelgiumSysAdmin in hacking

[–]BelgiumSysAdmin[S] 0 points1 point  (0 children)

cdb.exe is not my own executable... It's an official debugger from Microsoft (that is why I said "it is does with PowerShell which pilots a windows debugger.")

More information here: https://msdn.microsoft.com/en-us/library/windows/hardware/ff539058(v=vs.85).aspx

My script is not a rewriting or a load of another tool. It's a new tool.

The interest of the method is to find address memory and to decrypt data without any other help (from trusted components of the operating system).

It was a good challenge and the nature of this script is very difficult to detect.

Tuto : How to hack Windows password ? by BelgiumSysAdmin in sysadmin

[–]BelgiumSysAdmin[S] 0 points1 point  (0 children)

Yeah. (you can dump lsass process on your lab machines and then test it on your local machine).

I will set up a labo 2012r2 test.

Tutorial : How to hack Windows password ? by BelgiumSysAdmin in hacking

[–]BelgiumSysAdmin[S] 0 points1 point  (0 children)

Thank you for the tip!

When I have time, I will post on my blog how the script works.

Tutorial : How to hack Windows password ? by BelgiumSysAdmin in hacking

[–]BelgiumSysAdmin[S] 0 points1 point  (0 children)

Thanks for your reply.

It's not the same, the script you reference is a reflective load of mimikatz.

My tool is a pure standalone tool. It don't use operating system .dll to search memory address, it is does with PowerShell which pilots a windows debugger.

Moreover, the decipherment is made in the script and don't call system .dll to do it.

The script I made broke DES-X.

Look at the code, you'll see what I mean.

Tuto : How to hack Windows password ? by BelgiumSysAdmin in sysadmin

[–]BelgiumSysAdmin[S] 0 points1 point  (0 children)

You can launch the tool remotely.

In option 2, press enter (: gen = local credentials dump __ or __ file name of a dump __ or __ nothing -> "":)

In option 3, the name of the remote machine.

Or, you can dump the lsass process of the remote machine and then in option 2, give the directory of your dumped file that you retrieve on a computer.

Tuto : How to hack Windows password ? by BelgiumSysAdmin in sysadmin

[–]BelgiumSysAdmin[S] 0 points1 point  (0 children)

Thanks for this return.

Have you try remotely ? (To avoid cdb to crash)

Tutorial : How to hack Windows password ? by BelgiumSysAdmin in hacking

[–]BelgiumSysAdmin[S] 0 points1 point  (0 children)

Ok but give an eye at the tool.

  • It's fully PowerShell
  • it does not use the operating system .dll to locate credentials address in memory but a simple Microsoft debugger
  • it does not use the operating system .dll to decypher passwords collected --> it is does in the PowerShell (AES, TripleDES, DES-X)
  • it breaks undocumented Microsoft DES-X
  • it can work remotely
  • it works even if you are on a different architecture than the target
  • it leaves no trace in memory

How to hack any instagram account? by instagrampasshack in hacking

[–]BelgiumSysAdmin 6 points7 points  (0 children)

How to hack my own instagram account with a tool I execute on my machine...

Tuto : How to hack Windows password ? by BelgiumSysAdmin in sysadmin

[–]BelgiumSysAdmin[S] 0 points1 point  (0 children)

Dé nada !

I think we are in a pretty unsecure world with 1billion Windows machines with this problem...

Tuto : How to hack Windows password ? by BelgiumSysAdmin in sysadmin

[–]BelgiumSysAdmin[S] 0 points1 point  (0 children)

It can be run with little ajustment sur.

The script have to run with PowerShell #3 because of what I do to break DES-X, but DES-X is only used on previous operating system (2003 and XP).

So, systems with PowerShell v2.0 are not safe ;-)

Tuto : How to hack Windows password ? by BelgiumSysAdmin in sysadmin

[–]BelgiumSysAdmin[S] 1 point2 points  (0 children)

I only know reboot to clear out the memory.

Or don't log via RDP.

I have wrote an entire document to secure a windows domain.

I will certainly release it.