Closed
Conversation
Contributor
|
Hello,
Sorry, it was about SCCM, my bad :) |
Author
|
Hi, The initial use case for this script was dumping scheduled tasks credentials, which are stored in the SYSTEM user profile. I added SCCM when gentilkiwi published his code as the requirements are close enough. |
GeisericII
added a commit
to ThePorgs/impacket
that referenced
this pull request
Jun 3, 2024
fortra#1137 Added SystemDPAPIdump.py example
Mercury0
added a commit
to Mercury0/impacket
that referenced
this pull request
Sep 11, 2024
Automates extraction of DPAPI credentials for SYSTEM user on remote host.
This was referenced Jul 17, 2025
This was referenced Dec 19, 2025
Collaborator
|
closing this one, we will move forward with #1917. Thanks! |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
This PR adds a new example,
SystemDPAPIdump.py, which automates extraction of DPAPI credentials for theSYSTEMuser on a remote host.Currently it extracts and decrypts DPAPI credentials files (used by the task scheduler, amongst others) and SCCM client credentials (following @gentilkiwi's publication and implementation), using a combination of WMI (SCCM), SMB client (retrieve files) and remote registry (retrieve DPAPI keys) features from the library.
Process:
dpapi_userkey(unless provided with-userkey, e.g. when previously obtained)dpapi_userkeyHas some error management to attempt cleanup even if something goes wrong, and tries to not perform unneeded operations.
Reuses code from secretsdump.py, wmiquery.py, dpapi.py, and smbclient.py.