Skip to content

I3IT/Detect.Remote.ShadowSnapshot.Dump

Repository files navigation

Detect.Remote.ShadowSnapshot.Dump

This project detects remote local credentials dumps using the "Shadow Snapshot method". This was implemented in Impacket in the following PR: [SECRETSDUMP] New Dump Method - Shadow Snapshot Method via WMI.

This project leverages Event Tracing for Windows (ETW) to monitor this behaviour.

Shadow Copy Creation and Removal Detection:

This PoC uses the Microsoft-Windows-WMI-Activity ETW provider to trace WMI method invocations. It specifically monitors:

  1. Shadow Copy creation via the Win32_ShadowCopy::Create method.
  2. Shadow Copy removal.

And this PoC monitor the Microsoft-Windows-SMBClient ETW provider for events indicating file reads over the SMB protocol.

  1. Detect reads to SYSTEM32\CONFIG\SAM, SYSTEM32\CONFIG\SECURITY and/or SYSTEM32\CONFIG\SYSTEM.

If this behaviour is detected, i.e, a Shadow Snapshot is created, then SAM, SYSTEM and/or SECURITY accessed via SMB and then the SS removed these are indicators about the use of that technique.

This project relies purely in ETW.

Sample Exec

Example

Impacket Secretsdump

Detection

Important Compilation note

Remember to add tdh.lib as a dependency, as this lib is not included by default.

Visual Studio Lib Dependency

About

Detect Remote Local Credentials Dumping using a Shadow Snapshot

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages