Next-generation secretsdump tool using DSInternals for credential extraction
Project description
secretsdump-ng
Credential dumping tool that uses DSInternals for extracting credentials from Windows systems, using any available command-execution port (rather than relying on 445).
Massive props to DSInternals & Impacket; this tool really isn't anything revolutionary and uses the impressive work already completed by Michael Grafnetter and the Fortra team.
Features
- NTDS.DIT extraction using DSInternals on Domain Controllers
- Registry hive dumping (SAM, SYSTEM, SECURITY) on Windows Servers
- Multi-threaded operations for dumping from multiple hosts
- Secure transfer of credentials via HTTPS
- Filtered extraction - dump only specific users with
--just-dc-user
Usage
# Dump all credentials from a single host
secretsdump-ng 192.168.1.10 username password
# Dump from multiple hosts using IP range
secretsdump-ng 192.168.1.10-20 username password
# Dump only a specific user
secretsdump-ng 192.168.1.10 username password --just-dc-user administrator
# Use more threads for faster scanning
secretsdump-ng 192.168.1.1-254 username password --threads 20
# Verbose output
secretsdump-ng 192.168.1.10 username password -v
How It Works
- Sets up HTTPS server on port 1338 to receive credential dumps
- Executes PowerShell remotely on target systems using
AuthFinder - Extracts registry hives (SAM, SYSTEM, SECURITY) from all Windows systems
- Extracts NTDS.DIT using DSInternals on Domain Controllers
- Processes and formats credentials using impacket-secretsdump
- Saves output to
./secretsdump_ng_out/[IP]/secretsdump.out
Admin accounts are highlighted with (admin) tag. Machine accounts are sorted to the bottom.
Security Notes
- Uses temporary SSL certificates for HTTPS transfers
- Temporary files on target systems are stored in
$env:TEMPand cleaned up after extraction
License
MIT License - see LICENSE file for details
Disclaimer
This tool is intended for authorized security assessments only. Ensure you have proper authorization before using this tool on any systems.
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file secretsdump_ng-1.1.2.tar.gz.
File metadata
- Download URL: secretsdump_ng-1.1.2.tar.gz
- Upload date:
- Size: 11.5 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.14.2
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
53b86712674f20d6eb5090457f8f9bb6b36b2398e676acddd36fcea0210008e5
|
|
| MD5 |
c0f5afbb4b783b64e8dc75b5956c0163
|
|
| BLAKE2b-256 |
575d5c19f32be43172c36caa5371151a9a61ce9d185cbb043d59815554e04b18
|
File details
Details for the file secretsdump_ng-1.1.2-py3-none-any.whl.
File metadata
- Download URL: secretsdump_ng-1.1.2-py3-none-any.whl
- Upload date:
- Size: 11.0 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.14.2
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
98bd6b6453192f21511f0d43049f99d6ee36be477d8813a94f59caa30638886b
|
|
| MD5 |
a78e16f616221e772c8d564fedd8d0bf
|
|
| BLAKE2b-256 |
0c0ba9455d2f13e5c3e8553df973c1bd9a16a6e4c6bab6e102e808367882f2ad
|