├── CHANGELOG ├── COPYING ├── COPYING.PYSECDUMP ├── README.md ├── framework ├── __init__.py └── win32 │ ├── __init__.py │ ├── domcachedumplive.py │ ├── hashdumplive.py │ └── lsasecretslive.py ├── pysecdump.exe ├── pysecdump.py └── wpc ├── __init__.py ├── ace.py ├── acelist.py ├── cache.py ├── conf.py ├── drive.py ├── drives.py ├── exploit.py ├── file.py ├── files.py ├── group.py ├── groups.py ├── mspatchdb.py ├── parseOptions.py ├── patchdata.py ├── principal.py ├── process.py ├── processes.py ├── regkey.py ├── report ├── __init__.py ├── fileAcl.py ├── issue.py ├── issueAcl.py ├── issues.py └── report.py ├── sd.py ├── service.py ├── services.py ├── share.py ├── shares.py ├── thread.py ├── token.py ├── user.py ├── users.py └── utils.py /CHANGELOG: -------------------------------------------------------------------------------- 1 | Version: 1.0 Date: 2013-01-16 2 | 3 | Initial release. 4 | -------------------------------------------------------------------------------- /COPYING.PYSECDUMP: -------------------------------------------------------------------------------- 1 | This tool may be used for legal purposes only. Users take full responsibility 2 | for any actions performed using this tool. The author accepts no liability for 3 | damage caused by this tool. If these terms are not acceptable to you, then you 4 | may not use this tool. 5 | 6 | In all other respects the GPL version 2 applies. -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | pysecdump 2 | ========= 3 | 4 | Python-based tool to dump security information from Windows systems 5 | 6 | Overview 7 | ======== 8 | 9 | pysecdump is a python tool to extract various credentials and secrets from 10 | running Windows systems. It currently extracts: 11 | * LM and NT hashes (SYSKEY protected) 12 | * Cached domain passwords 13 | * LSA secrets 14 | * Secrets from Credential Manager (only some) 15 | 16 | pysecdump can also: 17 | * Impersonate other processes - if you want a shell as another user 18 | * Enable currently held windows privileges - see "whoami /priv" 19 | 20 | It does exactly the same sort of things already implemented by gsecdump, 21 | Cain & Abel, metasploit and many other tools. 22 | 23 | This implementation is in python and that's probably the only notable thing 24 | about this implementation. 25 | 26 | If you think python is cool, this project might be of interest. If you don't, 27 | you should probably stop reading now. 28 | 29 | Credits 30 | ======= 31 | 32 | This is a derivative work of: 33 | 34 | creddump - http://code.google.com/p/creddump/ 35 | 36 | In fact very little of the code is different in pysecdump, 37 | which just pulls data from the registry instead of from on-disk hives 38 | 39 | windows-privesc-check - http://code.google.com/p/windows-privesc-check/ 40 | 41 | This is used mostly for the registry API 42 | 43 | I found the metasploit source code very handy for identifying the 44 | appropriate registry keys, so credit to those guys too for a great tool. 45 | 46 | Requirements 47 | ============ 48 | 49 | Nothing if you just want to run pysecdump.exe on a windows system. 50 | 51 | If you want to modify pysecdump.py then run recreate the .exe you need: 52 | 53 | * pywin32 - http://sourceforge.net/projects/pywin32/ 54 | * pycrypto - https://www.dlitz.net/software/pycrypto/ 55 | * pyinstaller - http://www.pyinstaller.org/ 56 | 57 | Usage 58 | ===== 59 | 60 | Dump cached domain hashes (run as SYSTEM): 61 |
62 | pysecdump -c 63 |64 | 65 | Dump LSA secrets (run as SYSTEM): 66 |
67 | pysecdump -l 68 |69 | 70 | Dump local password hashes from SAM (run as SYSTEM): 71 |
72 | pysecdump -s 73 |74 | 75 | Dump (some secrets) from Credential Manager (run as SYSTEM): 76 |
77 | pysecdump -C 78 |79 | 80 | Impersonate process ID 1234: 81 |
82 | pysecdump -i 1234 83 | whoami /all 84 |85 | 86 | Enable all currently held windows privileges (can also use with -i): 87 |
88 | pysecdump -e 89 | whoami /priv 90 |91 | 92 | Converting to .exe 93 | ================== 94 |
95 | cd C:\pyinstaller-2.0 96 | pyinstaller.py -F "c:\somepath\pysecdump.py" 97 |98 | 99 | Features 100 | ======== 101 | 102 | * Is written in python 103 | * Supports XP family and Vista+ registry locations 104 | * Uses impersonation of all available processes when dumping Credential Manager. 105 | 106 | Author 107 | ====== 108 | 109 | pysecdump was adapted from creddump by pentestmonkey. 110 | 111 | creddump is written by Brendan Dolan-Gavitt (bdolangavitt@wesleyan.edu). 112 | For more information on Syskey, LSA secrets, cached domain credentials, 113 | and lots of information on volatile memory forensics and reverse 114 | engineering, check out: 115 | 116 | http://moyix.blogspot.com/ 117 | 118 | License 119 | ======= 120 | 121 | This program is free software: you can redistribute it and/or modify 122 | it under the terms of the GNU General Public License as published by 123 | the Free Software Foundation, either version 3 of the License, or 124 | (at your option) any later version. 125 | 126 | This program is distributed in the hope that it will be useful, 127 | but WITHOUT ANY WARRANTY; without even the implied warranty of 128 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the 129 | GNU General Public License for more details. 130 | 131 | You should have received a copy of the GNU General Public License 132 | along with this program. If not, see
Windows Privilege Escalation Report
Audit of Host:
This report was generated on
The audit was run as the user
The following table provides information about this audit:
139 |Hostname | 142 ||
Domain/Workgroup | 147 ||
Operating System | 152 ||
IP Addresses | 157 |
158 |
|
162 |
174 | |
176 |
177 | |
180 |