Skip to content

PeterGabaldon/WhatAboutSAM

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

CICD AssemblyScript C C++ Visual Studio Windows

"Buy Me A Coffee"

WhatAboutSAM

WhatAboutSAM is my custom Windows SAM dumper, reading it from the registry. So, SYSTEM privileges are needed. I wanted to study at a low level how Windows stores local user credentials in the Security Account Manager (SAM). As a Cybersecurity Engineer with a mostly offensive mindset, I have used many times the tools we all know: mimikatz, secretsdump (impacket), pwdump, hashdump (metasploit), crackmapexec (--sam parameter), LaZAgne...

Also, I wanted to practice some malware development techniques (enumerated below) and I needed an excuse for it. That is why I decided to implement my custom SAM Dumper.

It is currently in development.

Please, take a look at the credits because without these projects this would not have been possible.

Sample execution

TODO List

  • PEB Walking (avoid GetModuleHandle + GetProcAddress)
  • Call Stack Spoofing with Custom Callbacks (Thread Pools)
  • Native Functions
  • API Hashing
  • Travis CI (Finally done with Github Actions)
  • Debug Branch vs Release Branch
  • Shadow Snapshot Method
  • Test Old Algorithm. What a bummer. Microsoft Changed storage in SAM in Windows 10 1909
  • Command Line Parameters
  • Add more comments :)
  • Debug prints
  • Elevate to SYSTEM

Credits

Please, take a look to this project, without them I could not have developed WhatAboutSAM.

About

WhatAboutSAM is my custom PoC of a Windows SAM dumper

Resources

Stars

Watchers

Forks

Releases

No releases published

Sponsor this project

 

Packages

No packages published

Languages