Dumping DPAPI credz remotely
Go to file
Login Securite 4ac529f667
Merge pull request #49 from zblurx/MFA
Packaging DonPAPI and minor fixes
2023-06-26 12:10:26 +02:00
donpapi fix cert dump 2023-06-16 17:13:10 +02:00
.gitignore Update .gitignore 2022-01-29 16:07:10 +01:00
pyproject.toml packaging 2023-06-14 13:01:24 +02:00
readme.md packaging 2023-06-14 13:01:24 +02:00

DonPAPI

Dumping revelant information on compromised targets without AV detection alt text

DPAPI dumping

Lots of credentials are protected by DPAPI.

We aim at locating those "secured" credentials, and retrieve them using :

  • User password
  • Domaine DPAPI BackupKey
  • Local machine DPAPI Key (protecting TaskScheduled blob)

Curently gathered info

  • Windows credentials (Taskscheduled credentials & a lot more)
  • Windows Vaults
  • Windows RDP credentials
  • Windows certificates
  • AdConnect (still require a manual operation)
  • Wifi key
  • Internet explorer Credentials
  • Chrome cookies & credentials
  • Firefox cookies & credentials
  • VNC passwords
  • mRemoteNG password (with default config)

Check for a bit of compliance

  • SMB signing status
  • OS/Domain/Hostname/Ip of the audited scope

Operational use

With local admin account on a host, we can :

  • Gather machine protected DPAPI secrets
    • ScheduledTask that will contain cleartext login/password of the account configured to run the task
    • Wi-Fi passwords
  • Extract Masterkey's hash value for every user profiles (masterkeys beeing protected by the user's password, let's try to crack them with Hashcat)
  • Identify who is connected from where, in order to identify admin's personal computers.
  • Extract other non-dpapi protected secrets (VNC/Firefox/mRemoteNG)
  • Gather protected secrets from IE, Chrome, Firefox and start reaching the Azure tenant.

With a user password, or the domain PVK we can unprotect the user's DPAPI secrets.

Examples

Authenticate with

Dump all secrets of the target machine with an Domain admin account :

DonPAPI domain/user:passw0rd@target

or a Local one :

DonPAPI -local_auth user@target

Using PtH

DonPAPI --hashes <LM>:<NT> domain/user@target

Using kerberos (-k)

DonPAPI -k domain/user@target

Using a user with LAPS password reading rights

DonPAPI -laps domain/user:passw0rd@target

Using relayed socks :
HackndoRealying

Decrypt secrets

to decrypt secrets DonPapi might need :

  • Nothing, when facing reversible encryption (firefox, mremoteNG, VNC)
  • the machine DPAPI Key, we will fetch it automatically thanks to secretdumps when having an admin acces (Wifi, scheduled task passwords)
  • the user password for everything related to DPAPI Protection, or de DPAPI Domain Backup key

It is possible to provide a list of credentials that will be tested on the target. DonPAPI will try to use them to decipher masterkeys.

This credential file must have the following syntax:

user1:pass1
user1:pass2
user2:passX
...
DonPAPI -credz credz_file.txt domain/user:passw0rd@target

When a domain admin user is available, it is possible to dump the domain backup key using impacket dpapi.py tool:

dpapi.py backupkeys --export -t domain/user:passw0rd@target_dc_ip

This backup key (pvk file) can then be used to dump all domain user's secrets!

DonPAPI -pvk domain_backupkey.pvk domain/user:passw0rd@domain_network_list

Select targets

Target can be an IP, IP range, CIDR, FQDN, file containing list targets (one per line)

Reports & raw data

DonPapi will extract and consolidate a bunch of raw information

  • raw user and passwords in 'raw_credz'
  • dumped certificates informations
  • raw cookies
  • raw sam hash
  • raw users masterkey's hash (Good luck with cracking those, but it might be the only hash you'll get for some SuperAdmin Accounts)
  • raw DCC2

HTML Reports will be created, as you'll probably have so many passwords that your browser will crash rendering it, i tried to separate those in few reports.

Cookies are great to bypass MFA, by clicking on a cookie in the report you'll copy what you need to paste to cookie in your browser dev console.

If the certificate allow client authentication, you can click on "Yes" to get a working certipy auth command with the certificate in your clipboard.

some info are excluded from the reports, you can still acces all the data in the sqlite3 donpapi.db database.

Opsec consideration

The RemoteOps part can be spoted by some EDR (it's basically a secretdump). It can be disabled using --no_remoteops flag, but then the machine DPAPI key won't be retrieved, and scheduled task credentials/Wi-Fi passwords won't be harvested.

Installation

git clone https://github.com/login-securite/DonPAPI.git
cd DonPAPI
python3 -m pip install .
DonPAPI

or

pip install git+https://github.com/login-securite/DonPAPI.git
DonPAPI

or

git clone git+https://github.com/login-securite/DonPAPI.git
cd DonPAPI
poetry update
poetry run DonPAPI

Credits

All the credits goes to these great guys for doing the hard research & coding :

Todo

  • Finish ADSync/ADConnect password extraction
  • CREDHISTORY full extraction
  • Further analysis ADAL/msteams
  • Implement Chrome <v80 decoder
  • Find a way to implement Lazagne's great modules

Changelog

v1.0
----
Initial release