Skip to content

Exploit allowing you to read registry hives as non-admin

Notifications You must be signed in to change notification settings

K-Mistele/HiveNightmare

 
 

Repository files navigation

HiveNightmare

aka SeriousSam. Exploit allowing you to read any registry hives as non-admin.

What is this?

An exploit for HiveNightmare, discovered by @jonasLyk, PoC by @GossiTheDog, powered by Porgs.

Forked by @0xblacklight, and updated to include the SYSTEM and SECURITY hives

Scope

Appears to work on all supported versions of Windows 10, where System Protection is enabled (should be enabled by default in most configurations). May not work on Windows Server

How does this work?

The permissions on key registry hives are set to allow all non-admin users to read the files by default, in most Windows 10 configurations. This is an error.

What does the exploit do?

Allows you to read SAM data (sensitive) in Windows 10, as well as the SYSTEM and SECURITY hives.

This exploit uses VSC to extract the SAM, SYSTEM, and SECURITY hives even when in use, and saves them in current directory as HIVENAME-haxx, for use with whatever cracking tools, or whatever, you want.

Pulling Credentials out

python3 secretsdump.py -sam SAM-haxx -system SYSTEM-haxx -security SECURITY-haxx LOCAL

Bugs and issues

  • Currently only looks for the first four system recovery snapshots.
  • Haven't added support for dumping SECURITY, SYSTEM etc registry hives yet as I can't be bothered.

Alt Image text

About

Exploit allowing you to read registry hives as non-admin

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • C++ 100.0%