Skip to main content

Next-generation secretsdump tool using DSInternals for credential extraction

Project description

secretsdump-ng

Credential dumping tool that uses DSInternals for extracting credentials from Windows systems, using any available command-execution port (rather than relying on 445).

Massive props to DSInternals & Impacket; this tool really isn't anything revolutionary and uses the impressive work already completed by Michael Grafnetter and the Fortra team.

Features

  • NTDS.DIT extraction using DSInternals on Domain Controllers
  • Registry hive dumping (SAM, SYSTEM, SECURITY) on Windows Servers
  • Multi-threaded operations for dumping from multiple hosts
  • Secure transfer of credentials via HTTPS
  • Filtered extraction - dump only specific users with --just-dc-user

Usage

# Dump all credentials from a single host
secretsdump-ng 192.168.1.10 username password

# Dump from multiple hosts using IP range
secretsdump-ng 192.168.1.10-20 username password

# Dump only a specific user
secretsdump-ng 192.168.1.10 username password --just-dc-user administrator

# Use more threads for faster scanning
secretsdump-ng 192.168.1.1-254 username password --threads 20

# Verbose output
secretsdump-ng 192.168.1.10 username password -v

How It Works

  1. Sets up HTTPS server on port 1338 to receive credential dumps
  2. Executes PowerShell remotely on target systems using AuthFinder
  3. Extracts registry hives (SAM, SYSTEM, SECURITY) from all Windows systems
  4. Extracts NTDS.DIT using DSInternals on Domain Controllers
  5. Processes and formats credentials using impacket-secretsdump
  6. Saves output to ./secretsdump_ng_out/[IP]/secretsdump.out

Admin accounts are highlighted with (admin) tag. Machine accounts are sorted to the bottom.

Security Notes

  • Uses temporary SSL certificates for HTTPS transfers
  • Temporary files on target systems are stored in $env:TEMP and cleaned up after extraction

License

MIT License - see LICENSE file for details

Disclaimer

This tool is intended for authorized security assessments only. Ensure you have proper authorization before using this tool on any systems.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

secretsdump_ng-1.1.2.tar.gz (11.5 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

secretsdump_ng-1.1.2-py3-none-any.whl (11.0 kB view details)

Uploaded Python 3

File details

Details for the file secretsdump_ng-1.1.2.tar.gz.

File metadata

  • Download URL: secretsdump_ng-1.1.2.tar.gz
  • Upload date:
  • Size: 11.5 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.14.2

File hashes

Hashes for secretsdump_ng-1.1.2.tar.gz
Algorithm Hash digest
SHA256 53b86712674f20d6eb5090457f8f9bb6b36b2398e676acddd36fcea0210008e5
MD5 c0f5afbb4b783b64e8dc75b5956c0163
BLAKE2b-256 575d5c19f32be43172c36caa5371151a9a61ce9d185cbb043d59815554e04b18

See more details on using hashes here.

File details

Details for the file secretsdump_ng-1.1.2-py3-none-any.whl.

File metadata

  • Download URL: secretsdump_ng-1.1.2-py3-none-any.whl
  • Upload date:
  • Size: 11.0 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.14.2

File hashes

Hashes for secretsdump_ng-1.1.2-py3-none-any.whl
Algorithm Hash digest
SHA256 98bd6b6453192f21511f0d43049f99d6ee36be477d8813a94f59caa30638886b
MD5 a78e16f616221e772c8d564fedd8d0bf
BLAKE2b-256 0c0ba9455d2f13e5c3e8553df973c1bd9a16a6e4c6bab6e102e808367882f2ad

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page