Skip to content

This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone is created, it utilizes MINIDUMP_CALLBACK_INFORMATION callbacks to generate a memory dump of the cloned process

License

Notifications You must be signed in to change notification settings

Offensive-Panda/LsassReflectDumping

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 
 
 

Repository files navigation

LsassReflectDumping

This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone is created, it utilizes MINIDUMP_CALLBACK_INFORMATION callbacks to generate a memory dump of the cloned process.

Steps

  • Getting the handle of Lsass.exe process
  • Cloning Lsass.exe process using RtlCreateProcessReflection (Process Forking)
  • Using MINIDUMP_CALLBACK_INFORMATION callbacks to create cloned process minidump
  • Confirming the dump content and size.
  • Terminating the cloned process.

Usage

Simply execute the compiled file.

ReflectDump.exe 

Offline Dumping

Use Mimikatz or Pypykatz to parse the dump file offline.

sekurlsa::minidump [filename] sekurlsa::logonpasswords
pypykatz lsa minidump [filename]

Upcoming Features

* Encrypt dump before writing on disk to bypass static detection.
* Exfiltrate on C2 Server

Disclaimer

The content provided on this repository is for educational and informational purposes only.

Reference

https://www.deepinstinct.com/blog/dirty-vanity-a-new-approach-to-code-injection-edr-bypass

About

This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone is created, it utilizes MINIDUMP_CALLBACK_INFORMATION callbacks to generate a memory dump of the cloned process

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages