Custom SSP
Last updated
Last updated
Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE) Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)
Learn what is a SSP (Security Support Provider) here. You can create you own SSP to capture in clear text the credentials used to access the machine.
You can use the mimilib.dll
binary provided by Mimikatz. This will log inside a file all the credentials in clear text.
Drop the dll in C:\Windows\System32\
Get a list existing LSA Security Packages:
Add mimilib.dll
to the Security Support Provider list (Security Packages):
And after a reboot all credentials can be found in clear text in C:\Windows\System32\kiwissp.log
You can also inject this in memory directly using Mimikatz (notice that it could be a little bit unstable/not working):
This won't survive reboots.
Event ID 4657 - Audit creation/change of HKLM:\System\CurrentControlSet\Control\Lsa\SecurityPackages
Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE) Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)