Skip to content

pypykatz

This plugin implements the file parsing and secrets extraction part of pypykatz.

Commands

As usual, all functionalities will be discussed in command groups which logically group commands of similar nature.

LSASS

lsass

Parses an LSASS minidump file to extract secrets.

registry

Parses registry hive files and extracts the secrets. At least the system hive file must be provided.

NTDS

ntds

Parses an NTDS.dit file extracted from a domain controller. You must also supply the SYSTEM registry hive as it contains the decryption keys for the secrets to be extracted. The outfile specifies the location of the results file which will hold the extracted secrets.
The NTDS.dit file and the SYSTEM hive must first be 'uploaded' to the /volatile mountpoint of the browser.

DECRYPTORS

gppassword

Decrypts encrypted passwords found in Group Policy Preferences xml/ini files.

ofscan

Decryptes passwords found in TrendMicro's OfficeScan ofcscan.ini files.

HASHING

lm

Generates the LM hash of a given plaintext password

nt

Generates the NT hash of a given plaintext password.

msdcc

Generates the old Domain Cached Credentials hash of a given password

msdcc2

Generates the new (current) Domain Cached Credentials hash of a given username and password

kerberos

Generates the kerberos keys for a given passowrd. Be careful, the AES key is generated from using the username and domain as a salt, and this salt might not always be static.

hashes

Generates all the hashes mentioned above in one go.