https://github.com/0xdea/blindsight
Red teaming tool to dump LSASS memory, bypassing basic countermeasures.
https://github.com/0xdea/blindsight
mimikatz minidump redteaming rust tactical-exploitation windows
Last synced: about 1 month ago
JSON representation
Red teaming tool to dump LSASS memory, bypassing basic countermeasures.
- Host: GitHub
- URL: https://github.com/0xdea/blindsight
- Owner: 0xdea
- License: mit
- Created: 2024-07-18T07:35:43.000Z (about 1 year ago)
- Default Branch: master
- Last Pushed: 2024-12-31T15:28:15.000Z (9 months ago)
- Last Synced: 2025-03-30T10:06:25.551Z (6 months ago)
- Topics: mimikatz, minidump, redteaming, rust, tactical-exploitation, windows
- Language: Rust
- Homepage: https://0xdeadbeef.info
- Size: 52.7 KB
- Stars: 213
- Watchers: 2
- Forks: 25
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# blindsight
[](https://github.com/0xdea/blindsight)
[](https://github.com/0xdea/blindsight)
[](https://github.com/0xdea/blindsight)
[](https://twitter.com/0xdea)
[](https://infosec.exchange/@raptor)> "There's no such things as survival of the fittest.
> Survival of the most adequate, maybe.
> It doesn't matter whether a solution's optimal.
> All that matters is whether it beats the alternative."
>
> -- Peter Watts, Blindsight (2006)Red teaming tool to dump LSASS memory, bypassing basic countermeasures.
It uses Transactional NTFS (TxF API) to transparently scramble the memory
dump, to avoid triggering AV/EDR/XDR.Blog post:
*
See also:
*
*
*
*
*
*
*
*## Cross-compiling (macOS example)
```sh
$ brew install mingw-w64
$ rustup target add x86_64-pc-windows-gnu
$ cargo build --release --target x86_64-pc-windows-gnu
```## Usage
Inside an Administrator's PowerShell window:
```sh
C:\> .\blindsight.exe [dump | file_to_unscramble.log]
```## Examples
Dump LSASS memory:
```sh
C:\> .\blindsight.exe
```Unscramble memory dump:
```sh
C:\> .\blindsight.exe 29ABE9Hy.log
```## Tested on
* Microsoft Windows 10 (x64)
* Microsoft Windows 11 (x64)
* Microsoft Windows 11 (ARM64)
* Microsoft Windows Server 2016 (x64)
* Microsoft Windows Server 2019 (x64)
* Microsoft Windows Server 2022 (x64)*Note: Do not test on production servers, as accessing LSASS might cause system instability!*
## TODO
* Optimize memory usage (simply corrupt "magic bytes" instead of XORing?)
* Use litcrypt2 or similar to encrypt strings locally
* Allow to manually specify LSASS pid to avoid noisy process scans
* Avoid directly opening LSASS handle (e.g., via PssCaptureSnapshot)
* Use https://github.com/Kudaes/DInvoke_rs or similar for API hooks evasion
* https://splintercod3.blogspot.com/p/the-hidden-side-of-seclogon-part-3.html
* Implement fileless exfiltration channels (e.g., TFTP, FTP, HTTP...)
* Consider dumping to memory using minidump callbacks instead of TxF API
* https://adepts.of0x.cc/hookson-hootoff/
* Consider better command line handling if minimal is not enough