Work in progress
With administrative credentials, this tool will dump the lsass.exe proccess on a remote computer, download the dump file locally, which can then be processed through mimikatz on your local machine. The idea here is to obtain additional credentials from a compromised box, without the need of having to bypass AV.
In my testing, some AV will flag the dumping of the lsass process, however, in most cases the dumpfile will remain on the remote file system for a few seconds - enough to retrieve it as part of this script.
pip3 install -r requirements
Single target: python3 humptydumpty.py -t <hostname/IP> -u <username> -p <password>
List of IPs/Hostnames from a file: python3 humptydumpty.py -f <filename> -u <username> -p <password>
By default:
- Dumpfiles will be stored in current working directory, use
-o /dest/dir/
to output to a different directory - Local authentication is used, use
-d acme.local
for domain authentication.
Automated credential dumping:
I've added automated credential dumping with pypykatz (Checkout @skelec awesome project here: https://github.com/skelsec/pypykatz - Thanks!). While it's working well for single targets, there are still issues for targets loaded through a file. For now, my pypykatz implementation does not dump automatically when loading targets from a file.
If you want to disregard autodumping credentials all together, add the --dont-dump
option.