Penetration Testing mailing list archives

Windows Credentials Editor v1.2 release


From: Hernan Ochoa <hernan () ampliasecurity com>
Date: Mon, 18 Apr 2011 09:47:10 -0300

Windows Credentials Editor v1.2

New features in this version:
-g              Generate LM & NT Hash.
                Parameters: <password>.
-K              Dump Kerberos tickets to file (unix & 'windows wce' format)
-k              Read Kerberos tickets from file and insert into Windows
cache

Description:
Windows Credentials Editor (WCE) allows to list logon sessions and add,
change, list and delete associated credentials (ex.: LM/NT hashes and
Kerberos tickets). This can be used, for example, to perform
pass-the-hash on Windows, obtain NT/LM hashes from memory (from
interactive logons, services, remote desktop connections, etc.) which
can be used to perform further attacks, obtain Kerberos tickets and
reuse them in other Windows or Unix systems.

WCE v1.2 supports obtaining logon sessions and NTLM credentials just by
reading
memory without performing code injection.

Dumping Kerberos tickets and adding them to the Windows cache was tested
on Windows 7; your feedback is welcome.


Download:
http://www.ampliasecurity.com/research/wce_v1_2.tgz





------------------------------------------------------------------------
This list is sponsored by: Information Assurance Certification Review Board

Prove to peers and potential employers without a doubt that you can actually do a proper penetration test. IACRB CPT 
and CEPT certs require a full practical examination in order to become certified. 

http://www.iacertification.org
------------------------------------------------------------------------


Current thread: