ohio813 / creddump

Automatically exported from code.google.com/p/creddump
GNU General Public License v3.0
0 stars 0 forks source link

OVERVIEW

creddump is a python tool to extract various credentials and secrets from Windows registry hives. It currently extracts:

It essentially performs all the functions that bkhive/samdump2, cachedump, and lsadump2 do, but in a platform-independent way.

It is also the first tool that does all of these things in an offline way (actually, Cain & Abel does, but is not open source and is only available on Windows).

REQUIREMENTS

alldump has only been tested on python 2.5. It should work on 2.4 as well, but will likely need modification before it will work on 2.3 or below.

python-crypto is required for its MD5/DES/RC4 support. To obtain it, see: http://www.amk.ca/python/code/crypto

For lsadump: system and SECURITY hives For cachedump: system and SECURITY hives For pwdump: system and SAM hives

USAGE

Dump cached domain hashes: usage: ./cachedump.py

Dump LSA secrets: usage: ./lsadump.py

Dump local password hashes: usage: ./pwdump.py

FEATURES

AUTHOR

creddump is written by Brendan Dolan-Gavitt (bdolangavitt@wesleyan.edu). For more information on Syskey, LSA secrets, cached domain credentials, and lots of information on volatile memory forensics and reverse engineering, check out:

http://moyix.blogspot.com/

CREDITS

LICENSE

This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.

This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.

You should have received a copy of the GNU General Public License along with this program. If not, see http://www.gnu.org/licenses/.