diff --git a/db/modules_metadata_base.json b/db/modules_metadata_base.json index e36c2b91f29f..335fa3224114 100644 --- a/db/modules_metadata_base.json +++ b/db/modules_metadata_base.json @@ -26358,9 +26358,10 @@ "type": "auxiliary", "author": [ "Alberto Solino", - "Christophe De La Fuente" + "Christophe De La Fuente", + "antuache" ], - "description": "Dumps SAM hashes and LSA secrets (including cached creds) from the\n remote Windows target without executing any agent locally. First, it\n reads as much data as possible from the registry and then save the\n hives locally on the target (%SYSTEMROOT%\\Temp\\random.tmp). Finally, it\n downloads the temporary hive files and reads the rest of the data\n from it. This temporary files are removed when it's done.\n\n On domain controllers, secrets from Active Directory is extracted\n using [MS-DRDS] DRSGetNCChanges(), replicating the attributes we need\n to get SIDs, NTLM hashes, groups, password history, Kerberos keys and\n other interesting data. Note that the actual `NTDS.dit` file is not\n downloaded. Instead, the Directory Replication Service directly asks\n Active Directory through RPC requests.\n\n This modules takes care of starting or enabling the Remote Registry\n service if needed. It will restore the service to its original state\n when it's done.\n\n This is a port of the great Impacket `secretsdump.py` code written by\n Alberto Solino.", + "description": "Dumps SAM hashes and LSA secrets (including cached creds) from the\n remote Windows target without executing any agent locally. This is\n done by remotely updating the registry key security descriptor,\n taking advantage of the WriteDACL privileges held by local\n administrators to set temporary read permissions.\n\n This can be disabled by setting the `INLINE` option to false and the\n module will fallback to the original implementation, which consists\n in saving the registry hives locally on the target\n (%SYSTEMROOT%\\Temp\\.tmp), downloading the temporary hive\n files and reading the data from it. This temporary files are removed\n when it's done.\n\n On domain controllers, secrets from Active Directory is extracted\n using [MS-DRDS] DRSGetNCChanges(), replicating the attributes we need\n to get SIDs, NTLM hashes, groups, password history, Kerberos keys and\n other interesting data. Note that the actual `NTDS.dit` file is not\n downloaded. Instead, the Directory Replication Service directly asks\n Active Directory through RPC requests.\n\n This modules takes care of starting or enabling the Remote Registry\n service if needed. It will restore the service to its original state\n when it's done.\n\n This is a port of the great Impacket `secretsdump.py` code written by\n Alberto Solino.", "references": [ "URL-https://github.com/SecureAuthCorp/impacket/blob/master/examples/secretsdump.py" ], @@ -26376,7 +26377,7 @@ "microsoft-ds" ], "targets": null, - "mod_time": "2024-03-06 14:20:34 +0000", + "mod_time": "2024-04-30 20:52:23 +0000", "path": "/modules/auxiliary/gather/windows_secrets_dump.rb", "is_install_path": true, "ref_name": "gather/windows_secrets_dump",