Skip to main content

Next-generation secretsdump tool using DSInternals for credential extraction

Project description

secretsdump-ng

Credential dumping tool that uses DSInternals for extracting credentials from Windows systems, using any available command-execution port (rather than relying on 445).

Massive props to DSInternals & Impacket; this tool really isn't anything revolutionary and uses the impressive work already completed by Michael Grafnetter and the Fortra team.

Features

  • NTDS.DIT extraction using DSInternals on Domain Controllers
  • Registry hive dumping (SAM, SYSTEM, SECURITY) on Windows Servers
  • Multi-threaded operations for dumping from multiple hosts
  • Secure transfer of credentials via HTTPS
  • Filtered extraction - dump only specific users with --just-dc-user

Usage

# Dump all credentials from a single host
secretsdump-ng 192.168.1.10 username password

# Dump from multiple hosts using IP range
secretsdump-ng 192.168.1.10-20 username password

# Dump only a specific user
secretsdump-ng 192.168.1.10 username password --just-dc-user administrator

# Use more threads for faster scanning
secretsdump-ng 192.168.1.1-254 username password --threads 20

# Verbose output
secretsdump-ng 192.168.1.10 username password -v

How It Works

  1. Sets up HTTPS server on port 1338 to receive credential dumps
  2. Executes PowerShell remotely on target systems using exec_across_windows.py
  3. Extracts registry hives (SAM, SYSTEM, SECURITY) from all Windows systems
  4. Extracts NTDS.DIT using DSInternals on Domain Controllers
  5. Processes and formats credentials using impacket-secretsdump
  6. Saves output to ./secretsdump_ng_out/[IP]/secretsdump.out

Admin accounts are highlighted with (admin) tag. Machine accounts are sorted to the bottom.

Security Notes

  • Uses temporary SSL certificates for HTTPS transfers
  • Temporary files on target systems are stored in $env:TEMP and cleaned up after extraction

License

MIT License - see LICENSE file for details

Disclaimer

This tool is intended for authorized security assessments only. Ensure you have proper authorization before using this tool on any systems.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

secretsdump_ng-1.1.1.tar.gz (11.6 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

secretsdump_ng-1.1.1-py3-none-any.whl (11.0 kB view details)

Uploaded Python 3

File details

Details for the file secretsdump_ng-1.1.1.tar.gz.

File metadata

  • Download URL: secretsdump_ng-1.1.1.tar.gz
  • Upload date:
  • Size: 11.6 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.14.2

File hashes

Hashes for secretsdump_ng-1.1.1.tar.gz
Algorithm Hash digest
SHA256 a21195ac3822faa79803a7622b755248e1914bda337b3ef19a9fc0a691514df0
MD5 11e269c08c2356c6998bd4e1d9b4870c
BLAKE2b-256 b1298295e9af1ee371eefe784b9beb77f2a9d4991a9991cf7d9b5b3ba7c43d36

See more details on using hashes here.

File details

Details for the file secretsdump_ng-1.1.1-py3-none-any.whl.

File metadata

  • Download URL: secretsdump_ng-1.1.1-py3-none-any.whl
  • Upload date:
  • Size: 11.0 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.14.2

File hashes

Hashes for secretsdump_ng-1.1.1-py3-none-any.whl
Algorithm Hash digest
SHA256 408a23c12752a893cc1f6c9494c5a17d155498a69b901fea3a913841340eb65b
MD5 0eee4197ce76d9cb80620fc3457937b8
BLAKE2b-256 75e18deca6deca1102d33dc9a47eb216592bc53bf9825d5b88da186573e161ed

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page