create 🛠️
dpapi::create
creates a DPAPI Masterkey file from raw key and metadata. It comes in handy when you want to decrypt a victim's DPAPI secrets locally in your machine. CoreSecurity has published a guide on how you can clone the Google Chrome Victim's session and decrypt it from your own box. Benjamin has also tweeted how you can recreate masterkeys on your own machine to steal browser sessions and bypass 2FA. It has the following command line arguments:
/sid
: the Security Identifier of the target user/md4
: the MD4 key/key
: The masterkey. It can be obtained throughsekurlsa::dpapi
``/sha1
: the SHA1 key. It can be obtained throughsekurlsa::dpapi
``/hash
: the SHA1 hash of YOUR password when porting the victim's DPAPI files to your system/dpapi
: TODO 🛠️/guid
: the user's GUID. it can be obtained throughsekurlsa::dpapi
. it is also the szGuid output value of thedpapi::masterkey in:"C:\Users<UserName>\AppData\Roaming\Microsoft\Protect\SID\MasterKey_ID" /rpc
/system
: the DPAPI_SYSTEM key. It can be found throughlsadump::secrets
/password
: This is YOUR password when porting the victim's DPAPI files to your system/protected
: it defines the user account as a protected one
Last updated