An open API service indexing awesome lists of open source software.

https://github.com/kindtime/nosferatu

Windows NTLM Authentication Backdoor
https://github.com/kindtime/nosferatu

backdoor lsass ntlm windows

Last synced: 3 months ago
JSON representation

Windows NTLM Authentication Backdoor

Awesome Lists containing this project

README

          

# nosferatu

Windows NTLM/Kerberos Authentication Backdoor

## How it Works

First, the DLL is injected into the `lsass.exe` process, and will begin hooking authentication WinAPI calls. The targeted functions are:

- `NTLM: NtlmShared!MsvpPasswordValidate()`
- `Kerberos: cryptdll!CDLocateCSystem()`
- `Kerberos: samsrv!SamIRetrieveMultiplePrimaryCredentials()`

In the pursuit of not being detected, the hooked functions will call the original first and allow for the normal flow of authentication. Only after seeing that authentication has failed will the hook swap out the actual NTLM hash with the backdoor hash.

## Usage

nosferatu must be compiled as a 64 bit DLL.

![injector](photos/injector.png)

You can see it loaded using Procexp:

![loaded](photos/loaded.png)

Login example using Impacket:

![auth](photos/auth.png)

## Limitations
Hooks are not applied for 60 seconds while the system boots.