Skip to main content

Next-generation secretsdump tool using DSInternals for credential extraction

Project description

secretsdump-ng

Credential dumping tool that uses DSInternals for extracting credentials from Windows systems, using any available command-execution port (rather than relying on 445).

Massive props to DSInternals & Impacket; this tool really isn't anything revolutionary and uses the impressive work already completed by Michael Grafnetter and the Fortra team.

Features

  • NTDS.DIT extraction using DSInternals on Domain Controllers
  • Registry hive dumping (SAM, SYSTEM, SECURITY) on all Windows systems
  • Multi-threaded operations for dumping from multiple hosts
  • Secure transfer of credentials via HTTPS
  • Formatted output compatible with standard secretsdump format
  • Filtered extraction - dump only specific users with --just-dc-user

Usage

# Dump all credentials from a single host
secretsdump-ng 192.168.1.10 username password

# Dump from multiple hosts using IP range
secretsdump-ng 192.168.1.10-20 username password

# Dump only a specific user
secretsdump-ng 192.168.1.10 username password --just-dc-user administrator

# Use more threads for faster scanning
secretsdump-ng 192.168.1.1-254 username password --threads 20

# Verbose output
secretsdump-ng 192.168.1.10 username password -v

How It Works

  1. Sets up HTTPS server on port 1338 to receive credential dumps
  2. Executes PowerShell remotely on target systems using exec_across_windows.py
  3. Extracts registry hives (SAM, SYSTEM, SECURITY) from all Windows systems
  4. Extracts NTDS.DIT using DSInternals on Domain Controllers
  5. Processes and formats credentials using impacket-secretsdump
  6. Saves output to ./secretsdump_ng_out/[IP]/secretsdump.out

Admin accounts are highlighted with (admin) tag. Machine accounts are sorted to the bottom.

Security Notes

  • Uses temporary SSL certificates for HTTPS transfers
  • Temporary files on target systems are stored in $env:TEMP and cleaned up after extraction

License

MIT License - see LICENSE file for details

Disclaimer

This tool is intended for authorized security assessments only. Ensure you have proper authorization before using this tool on any systems.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

secretsdump_ng-1.0.0.tar.gz (11.1 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

secretsdump_ng-1.0.0-py3-none-any.whl (10.5 kB view details)

Uploaded Python 3

File details

Details for the file secretsdump_ng-1.0.0.tar.gz.

File metadata

  • Download URL: secretsdump_ng-1.0.0.tar.gz
  • Upload date:
  • Size: 11.1 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.14.2

File hashes

Hashes for secretsdump_ng-1.0.0.tar.gz
Algorithm Hash digest
SHA256 600b63fcd8bbd2b603bfcd7e2cda96e807a1775d34b93c5ae7b17b4adfd6ab35
MD5 d3de08f0484ba5dec22829547b77f03e
BLAKE2b-256 c0717251e0f31189114cfb15b5d220a2cd38911c90ae815fce2aea26e71ae8c0

See more details on using hashes here.

File details

Details for the file secretsdump_ng-1.0.0-py3-none-any.whl.

File metadata

  • Download URL: secretsdump_ng-1.0.0-py3-none-any.whl
  • Upload date:
  • Size: 10.5 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.14.2

File hashes

Hashes for secretsdump_ng-1.0.0-py3-none-any.whl
Algorithm Hash digest
SHA256 473efa7958433bb606d078bbec39d07f50e80669d5deed35bd5c90196a373947
MD5 59f0c6d35c13f1186a9f90f829337f9f
BLAKE2b-256 1f7dbbb9cc17843eeb788c681249b0864906289c3c0ecdc5b09964266032187e

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page