Skip to content

isaac-fletcher/nosferatu

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

7 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

nosferatu

Windows NTLM/Kerberos Authentication Backdoor

Fork with example Visual Studio Project. Includes additional files from Microsoft Detours to allow for compilation.

Bonus Privileged Injector taken from RIT's original repository.

How it Works

First, the DLL is injected into the lsass.exe process, and will begin hooking authentication WinAPI calls. The targeted functions are:

  • NTLM: NtlmShared!MsvpPasswordValidate()
  • Kerberos: cryptdll!CDLocateCSystem()
  • Kerberos: samsrv!SamIRetrieveMultiplePrimaryCredentials()

In the pursuit of not being detected, the hooked functions will call the original first and allow for the normal flow of authentication. Only after seeing that authentication has failed will the hook swap out the actual NTLM hash with the backdoor hash.

Usage

nosferatu must be compiled as a 64 bit DLL.

injector

You can see it loaded using Procexp:

loaded

Login example using Impacket:

auth

Limitations

Hooks are not applied for 60 seconds while the system boots.

About

Windows NTLM Authentication Backdoor

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • C++ 99.0%
  • C 1.0%