ActiveXSploit
ActiveXSploit
  • 21
  • 256 909
Dump Passwords from LSASS without Mimikatz!
Hello everyone!
In this video, we're going to show you how to dump credentials from the lsass process without mimikatz by the use of the MiniDumpWriteDump API Call! Make sure to leave a like and subscribe to our channel ;)
Resources :
- github.com/Vedant-Bhalgama/LSASSMiniDump
- learn.microsoft.com/en-us/windows/win32/api/minidumpapiset/nf-minidumpapiset-minidumpwritedump
Timestamps:
0:00 Intro
0:30 Dumping LSASS with MiniDumpWriteDump()
4:36 Attack demonstration
6:26 Loading dump file into mimikatz
Note:
All videos and tutorials are for informational and educational purposes only. I believe that ethical hacking, information security, and cybersecurity should be familiar subjects to anyone using digital information and computers. We believe that it is impossible to defend yourself from hackers without knowing how hacking is done. The tutorials and videos provided on this channel are only for those interested in learning about Ethical Hacking, Security, and Penetration Testing. Hacking tutorials are against the misuse of the information and we strongly suggest against it. Please regard the word hacking as ethical hacking or penetration testing every time this word is used.
Music Credit: LAKEY INSPIRED
Track Name: "Blue Boi"
Music By: LAKEY INSPIRED @ soundcloud.com/lakeyinspired
Original upload HERE - www.youtube.com/watch?v=wAukv...
Official "LAKEY INSPIRED" UA-cam Channel HERE - ua-cam.com/channels/Omy.html...
License for commercial use: Creative Commons Attribution 3.0 Unported "Share Alike" (CC BY-SA 3.0) License.
Full License HERE - creativecommons.org/licenses/...
Music promoted by NCM goo.gl/fh3rEJ
Переглядів: 9 433

Відео

Malware Development in C | PrivEsc via Access Token Manipulation | Token Impersonation
Переглядів 7 тис.Рік тому
Before starting out, please note, This video is for EDUCATIONAL PURPOSES ONLY! Hey guys! It's me ActiveXSploit back again with another video on the malware development series, But, Today we are not coding any reverse shell or doing some crazy process injection stuff, rather, we are going to code a privilege escalation exploit on our own and escalate from a local administrator to NT Authority SY...
Malware Development in C | Remote Process Injection
Переглядів 26 тис.2 роки тому
Hello everyone! Hope you all are doing well! Today I'll be teaching you process injection in C. Process injection is a technique in which an attacker can inject malicious shellcode or a DLL inside a remote process. Hope you all enjoy the video! Make sure to leave a like and subscribe my channel! Resources : CreateRemoteThread MSDN : docs.microsoft.com/en-us/windows/win32/api/processthreadsapi/n...
Malware Development in C | Executing Shellcode using WinAPI
Переглядів 14 тис.2 роки тому
Hello everyone! I am back again with a new video on the malware development series, today we have a look at how we can execute shellcode using Win32 API, We start out by discussing the theory part and then move on to the practical part where we code the malware (PS. Note that the source code will soon be uploaded and the link would be there in the description) Hope you enjoy the video! Make sur...
Malware Development in C | Coding a basic Reverse Shell
Переглядів 30 тис.2 роки тому
Hello everyone! Hope you are doing great, I am back again with a new video on the Malware Development Series, Today we are going to code a very basic reverse shell in C using socket programming. In the next video, We shall take a look at executing shellcode using various Windows API Functions. Thank you and have a nice day! Resources: - Microsoft Documentation : msdn.microsoft.com/ - Basic Sock...
Malware Development in C | Getting familiar with sockets
Переглядів 29 тис.3 роки тому
Hello everyone! Welcome to "Malware Development in C" series! In today's video, I will be explaining you socket programming in C, We shall first get started off by understanding basic workflow of a client and a server in socket programming and finally, we then get to the programming part Make sure to leave a like and subscribe to the channel ;) Note: All videos and tutorials are for information...
Comprehensive guide on using CrackMapExec | A swiss army knife for pentesting networks
Переглядів 20 тис.3 роки тому
Hello everyone, Hope you are doing great, In today's video, I show you the usage of CrackMapExec, CrackMapExec is a really great tool which can be used for bruteforcing various services, It is used a lot while pentesting active directory and cracking into windows boxes. The tool can do a lot more than just bruteforcing, Which I'll show you in this video! Make sure to leave a like and subscribe ...
Automate OSINT using Profil3r! | OSINT Tool
Переглядів 15 тис.3 роки тому
Hello everyone, In this video, I show you how to use an OSINT Tool named Profil3r to automate your OSINT. This tool is going to search for email accounts and social media accounts of the user specified, It also displays whether the email account was found in a data breach or not. If you like the video, Make sure to leave a like and subscribe to the channel! The Github repo of the tool was eithe...
Explaining and Exploiting PrintNightmare | CVE-2021-34527
Переглядів 16 тис.3 роки тому
Hello everyone, Hope you are doing great! In this video, I walk you through explaining and exploiting Print Nightmare, Print Nightmare is a very serious vulnerability which leads to RCE (Remote code execution) and LPE (Local Privilege Escalation). I hope you enjoy the video! Make sure to leave a like and subscribe to the channel ;) # Note : This video is just for educational purposes, Nor me, n...
Brainpan Buffer Overflow | OSCP Buffer Overflow Prep
Переглядів 2,7 тис.3 роки тому
Hello everyone, I am back with another video on OSCP Buffer Overflow Series, In today's video, We will be solving Brainpan, Brainpan is an intentionally vulnerable binary made for practicing buffer overflows, You can download the binary from the link included below, Hope you enjoy the video! Please make sure to leave a like and subscribe to the channel ;) Download brainpan : github.com/freddieb...
Free Float FTP Server Buffer OverFlow | OSCP BoF Prep
Переглядів 3,4 тис.3 роки тому
Hello everyone, I am back again with a new video on Windows Stack based buffer overflows, So this is basically going to be a series in which we are going to exploit real world applications, In today's video I chose FreeFloat FTP Server, In the next video, We will be exploiting SLMail. Hope you enjoy the video! Thanks for watching, Make sure to leave a like and subscribe to the channel! ;) FreeF...
RPC Enumeration | Active Directory Penetration Testing
Переглядів 12 тис.3 роки тому
Hello everyone! Hope you are doing great and are safe home! I am back again with a new video on RPC Enumeration in Active Directory. RPC Enumeration is critical and can be useful! It can be used to enumerate domain users, groups, SID's and a lot! Hope you guys enjoy the video, Make sure to leave a like and subscribe to the channel ;) Resources: www.ibm.com/docs/ssw_aix_72/commprogramming/ch8_rp...
Obfuscate PowerShell script using Invoke-Obfuscation!
Переглядів 14 тис.3 роки тому
Hello everyone, Hope you all are doing great and are safe. Today, I am back again with another video and in today's video, We are going to have a look at invoke-Obfuscation Tool, It is a very useful tool and can be useful for obfuscation of PowerShell Scripts and evading Anti-Viruses! Invoke-Obfuscation GitHub : github.com/danielbohannon/Invoke-Obfuscation Hope you liked the video! Make sure to...
Persistence on Windows! | Ways to achieve persistence on Windows!
Переглядів 6 тис.3 роки тому
Hello everyone! Hope you all are doing great and are safe, I am back again with another video on Persistence on Windows, In today's video, I will be covering automated and manual way for persistence, there are a lot of persistence methods available online and you can read about them! I will leave the links in description so you can read them ;) Make sure to leave a like and subscribe to the cha...
Kerberoast Practical Attack Demonstration!
Переглядів 2 тис.3 роки тому
Hello everyone! It's me back again with another video on kerberoasting practical, In the video I am going to explain how you can use an impacket script called "GetUserSPNS" in order to perform the attack, Hope you like the video! Make sure to leave a like and sub! ;) Impacket Scripts GitHub Repository : github.com/SecureAuthCorp/impacket Previous Video Link : ua-cam.com/video/ajOr4pcx6T0/v-deo....
Kerberoasting Explained | Kerberos Authentication | Active Directory
Переглядів 17 тис.3 роки тому
Kerberoasting Explained | Kerberos Authentication | Active Directory
Introduction to RustScan | RustScan Faster than Nmap?
Переглядів 8 тис.3 роки тому
Introduction to RustScan | RustScan Faster than Nmap?
Active Directory Enumeration Using PowerView | Active Directory Pentesting
Переглядів 7 тис.3 роки тому
Active Directory Enumeration Using PowerView | Active Directory Pentesting
Subdomain Enumeration | Penetration Testing
Переглядів 1,3 тис.3 роки тому
Subdomain Enumeration | Penetration Testing
LLMNR Poisoning Attack | Active Directory Exploitation
Переглядів 15 тис.3 роки тому
LLMNR Poisoning Attack | Active Directory Exploitation
Penetration Testing On Splunk! | Exploiting Splunk to Get Reverse Shell!
Переглядів 2,8 тис.3 роки тому
Penetration Testing On Splunk! | Exploiting Splunk to Get Reverse Shell!

КОМЕНТАРІ

  • @netrunner-j18
    @netrunner-j18 2 місяці тому

    You are teaching right things and managed to not show your face - standing out. Don't say bullshit word "Ethical" on your banner.

  • @Loading_Code
    @Loading_Code 2 місяці тому

    Sir can use cpp I am familiar with it

  • @ytg6663
    @ytg6663 3 місяці тому

    Is it not detected by EDR ?

    • @ActiveXSploit
      @ActiveXSploit 3 місяці тому

      It will be easily detected by EDR as majority EDRs use API Hooking

  • @timecop1983Two
    @timecop1983Two 3 місяці тому

    Thanks man one day your channel will grow believe me and in your-sefl!

  • @Jayisatwork
    @Jayisatwork 3 місяці тому

    profil3r: command not found

  • @shenyaowong1683
    @shenyaowong1683 4 місяці тому

    Hmm the final command to run the exploit seems to give me a connection failed error code. Any idea on how to solve it?

  • @dhrcoder5059
    @dhrcoder5059 4 місяці тому

    does it works for windwos 11 ???

  • @kobki66
    @kobki66 4 місяці тому

    that ain't a one liner bro, if its written on 7 lines :D

  • @briiiochee6703
    @briiiochee6703 4 місяці тому

    Hi, why when I launch the rev-shell does it ask me to choose the application with which to open? while I just want to run the program to listen with linux? please^^

    • @ActiveXSploit
      @ActiveXSploit 4 місяці тому

      mate, you gotta compile the code first to an executable using visual studio build tools, are you directly opening the .cpp file?

  • @devnchill
    @devnchill 5 місяців тому

    Your voice is really soothing. It was really helpful to get started into socket programming. Thanks!!

  • @a6071-b3y
    @a6071-b3y 5 місяців тому

    15:18 try "man 2 bind"

    • @ActiveXSploit
      @ActiveXSploit 5 місяців тому

      thanks for the advice mate :p

  • @lololololol88888
    @lololololol88888 5 місяців тому

    roadmap for mal Dev????

    • @ActiveXSploit
      @ActiveXSploit 5 місяців тому

      I will be uploading a video on that soon, Stay tuned for further updates!

    • @lololololol88888
      @lololololol88888 5 місяців тому

      @@ActiveXSploit looking forward!

  • @CodeX-0x00
    @CodeX-0x00 5 місяців тому

    Great brother, great hack tool , my respect

  • @sreejishnair5922
    @sreejishnair5922 6 місяців тому

    Bro which keyboard do you use?

    • @ActiveXSploit
      @ActiveXSploit 5 місяців тому

      A standard logitech wireless keyboard lmfao ;p

  • @vyacheslav4080
    @vyacheslav4080 6 місяців тому

    ❤️

  •  6 місяців тому

    Great video, why to close the handles when the process is about to finish?

    • @ActiveXSploit
      @ActiveXSploit 6 місяців тому

      You should close the handles once you finish using them as they are used to pass from one WinAPI function to another, and obviously for better resource management and security too, Leaving open handles can cause security issues where an attacker can easily exploit it

  • @fernandoh.2843
    @fernandoh.2843 6 місяців тому

    How you discorvery the size NOPS (x90)?

    • @ActiveXSploit
      @ActiveXSploit 6 місяців тому

      You mean the NOP instruction size x90 * 32 one? Like how did I know that it will be multiplied by 32 times?

    • @fernandoh.2843
      @fernandoh.2843 6 місяців тому

      @@ActiveXSploit yes

  • @B3rrk
    @B3rrk 10 місяців тому

    i got a weird error call stack?

    • @ActiveXSploit
      @ActiveXSploit 10 місяців тому

      Sorry? Can you elaborate more on this mate?

  • @applepine1048
    @applepine1048 10 місяців тому

    i still don't understand this. does printnightmare only happens to shared printers (e. g. USB) but not to printers on a switch? since printnightmare, all the patches we had installed didn't allow us to access our shared printer (connected to main pc with USB). the main pc is connected to a big LAN. now we bought a nice 8-port switch and connected lots of devices to it and the best part now: every pc can access the printer now perfectly. in the beginning, using the shared printer was only possible by downloading the driver from the main pc. since the printer is connected to the switch, the driver has to be downloaded from the hp-website.

  • @xmanrongngau5655
    @xmanrongngau5655 10 місяців тому

    Please, Help me! How do we set up the enviroment to run the shellcode in windows 10. I make this malware. But it doesn't work. I also create it in Flare-VM. But it also doesn't work.

  • @novianindy887
    @novianindy887 11 місяців тому

    to modify registry, you need admin access right?

  • @novianindy887
    @novianindy887 11 місяців тому

    is it still irreversible and make the payload undetected? by now?

    • @ActiveXSploit
      @ActiveXSploit 11 місяців тому

      I am pretty sure that the payload will get easily detected, You need to try multiple techniques and analyze how the AV/EDR is detecting a payload (for eg on signatures or in memory detection via hooks or something like that).

    • @novianindy887
      @novianindy887 11 місяців тому

      @@ActiveXSploit for a tool like Hoaxshell some said that it still works if we obfuscate the powershell script . Is this the obfuscation tool for the Hoaxshell payload?

  • @fancy_bread5959
    @fancy_bread5959 11 місяців тому

    thanks

  • @fideliorainbow8214
    @fideliorainbow8214 11 місяців тому

    how to make fileless malware like payload. I couldn't execute my shellcode.

    • @ActiveXSploit
      @ActiveXSploit 11 місяців тому

      I have a video on coding a process injection shellcode, you may check that out

  • @yuvrajchhatwani
    @yuvrajchhatwani 11 місяців тому

    Addictive series 😅

  • @yuvrajchhatwani
    @yuvrajchhatwani 11 місяців тому

    Quality content ❤❤❤

  • @RaGhav363
    @RaGhav363 Рік тому

    Bro the cource is finished or their are other vedios to come ?

    • @ActiveXSploit
      @ActiveXSploit Рік тому

      I am planning to release a bigger and better course on Udemy which covers everything from basics. And talking about this series on UA-cam, I mostly will be uploading one more video which will be the last.

    • @RaGhav363
      @RaGhav363 Рік тому

      @@ActiveXSploit thanks because I need that learning very important for me you can also make vedios in Hindi and English both it'll be approachable by others as well

  • @BDCAT_TranTrongHuy
    @BDCAT_TranTrongHuy Рік тому

    How do you run a program as nt authority/system without using 3rd party app (such as psexec)?

    • @ActiveXSploit
      @ActiveXSploit Рік тому

      you gotta escalate your privileges to SYSTEM level first, after which you can easily run any application on the system as SYSTEM

    • @BDCAT_TranTrongHuy
      @BDCAT_TranTrongHuy Рік тому

      @@ActiveXSploit how do you escalate your privileges to SYSTEM :(

    • @ActiveXSploit
      @ActiveXSploit Рік тому

      @@BDCAT_TranTrongHuy you gotta learn privilege escalation techniques for that, there is a good course by TCM on that, for both windows and linux, you should check that out

  • @tahataha1408
    @tahataha1408 Рік тому

    thank u so much that was very insightful <3

  • @jonathanmartinez2731
    @jonathanmartinez2731 Рік тому

    Nice and easy tutorial , good job

  • @cybersecurity8888
    @cybersecurity8888 Рік тому

    Love u

  • @rtr0spct210
    @rtr0spct210 Рік тому

    This format is great, thanks for making these vids.

  • @raymondreddington7402
    @raymondreddington7402 Рік тому

    none of this stuff, ive tried 10 different people i keep getting the same errors so I know its my system. every app installs perfeclty accept for this

  • @dhozegaming3125
    @dhozegaming3125 Рік тому

    User name of what fb insta or someting???(john doe)

    • @ActiveXSploit
      @ActiveXSploit Рік тому

      Just a common username, it will search all the social media platforms matching with the username you've provided

  • @deckard5pegasus673
    @deckard5pegasus673 Рік тому

    This is not remote process injection. This is injection into a local process, not a remote process. despite the name of the function call "CreateRemoteThread"

    • @ActiveXSploit
      @ActiveXSploit Рік тому

      This literally is remote process injection mate, I'm injecting the shellcode in a remote process running on Target

    • @deckard5pegasus673
      @deckard5pegasus673 Рік тому

      @@ActiveXSploit No, when a process is running in the same PC it's local and the other process is running in the same machine. "Remote" refers to a process running in a different PC, i.e. over the network, such in the case of RCE

    • @ActiveXSploit
      @ActiveXSploit Рік тому

      Mate, both things are entirely different, remote process injection is injecting into a different process running on the target system, whereas local process injection is injecting the shellcode itself in the local process which is running. If you don't believe me you should check this out www.ired.team/offensive-security/code-injection-process-injection/process-injection

  • @thinkerly1
    @thinkerly1 Рік тому

    screens far too smal, impossible to watch

  • @BatBatov666
    @BatBatov666 Рік тому

    I need microscope to see that tiny font

    • @ActiveXSploit
      @ActiveXSploit Рік тому

      I apologize for that mate, I've fixed the font size issue in the videos uploaded after this one

    • @BatBatov666
      @BatBatov666 Рік тому

      Thnx,I will subscribe for appritiation@@ActiveXSploit

  • @asldkfjzopiuqea
    @asldkfjzopiuqea Рік тому

    Do you have to do the injection process once? Or when the pc reboots, the injections disappears?

    • @ActiveXSploit
      @ActiveXSploit Рік тому

      Yeah the injection process only works once, it isn't persistent, though you can make it persistent. But, you gotta code it in such a way that it can find PIDS on the basis of the process name, as PID of every process changes on reboot.

  • @msamridha1604
    @msamridha1604 Рік тому

    What resolution have you set for xfreerdp ? It look pretty good !

    • @ActiveXSploit
      @ActiveXSploit Рік тому

      I don't really remember mate but pretty sure it must be set around 1080p i guess

  • @kaimunroe586
    @kaimunroe586 Рік тому

    Thank you sir! Will it work without admin commend prompt?

    • @ActiveXSploit
      @ActiveXSploit Рік тому

      Nope, you do require local admin privileges initially, because that privilege as the SeDebugPrivilege enabled, so you can escalate to SYSTEM user via this

  • @alisaadoud8238
    @alisaadoud8238 Рік тому

    Great chanel +1 subscribe

  • @mahmutagcabay4086
    @mahmutagcabay4086 Рік тому

    Allah Razı Olsun..

  • @igornemorssa2936
    @igornemorssa2936 Рік тому

    Without mimikatz 😂😂 , stupid

  • @Ghrkriiewii9180
    @Ghrkriiewii9180 Рік тому

    Hi. I get error arguement of type const char * is not incompatible with parameter of type “LPWSTR”. This is in CreateProcess function parameter “cmd.exe”. The code can compile with g++ and the function can run but my netcat dont get that connection

    • @ActiveXSploit
      @ActiveXSploit Рік тому

      Make the cmd.exe string a long byte integer, by adding a L in front of it like this L"cmd.exe"

    • @Ghrkriiewii9180
      @Ghrkriiewii9180 Рік тому

      @@ActiveXSploit Hi. Even without the L, the code can compile with warnings. I added a debug line at bottom of CreateProcess and it seems the CreateProcess can run but on netcat just shuts down. Also when adding the L to “cmd.exe” like L”cmd.exe”. The code cannot compile. I get const wchar_t* cannot convert to LPSTR. While the original code can compile with warnings and can run, but netcat doesn’t establish a connection to command prompt

    • @ActiveXSploit
      @ActiveXSploit Рік тому

      Strange, are you sure the IP and the port provided in the code are correct? And make sure for the same on the netcat side, make sure you're listening on the correct port, also program compiles with no error right? Do you see it crashing when CreateProcess executes?

    • @Ghrkriiewii9180
      @Ghrkriiewii9180 Рік тому

      @@ActiveXSploit hi. Ip and port are all correct because I got connection on my netcat. I think the program can run with the warning after compiling it. But netcat does not get cmd.exe connection even after the CreateProcess function is ran. Netcat just exits after I press enter I added a print line after the CreateProcess and the print line suggests that CreateProcess ran. I’m not exactly sure what is happening. I did your other process injection video which injects a shell code into an open process with PID and that works well so I assume netcat has nothing to do with problem. I did (LPSTR) “cmd.exe” and the program can compile with no errors even though there is a red line at the (LPSTR). I also did an error check if (!CreateProcess(…)) { printf(“[-] Create Process Failure/n”); return 1; } And it did not get any errors. This is weird. I compile it with: g++ -o reverse_shell reverse_shell.cpp -lws2_32

    • @Ghrkriiewii9180
      @Ghrkriiewii9180 Рік тому

      @@ActiveXSploit I made a simple program to try and run some commands and the CreateProcess can run the commands so I think there is some problem with connecting to netcat but idk I’m just starting out in malware development. Thanks for these videos you have btw their a hidden gem 😊

  • @HunterXnotDefine
    @HunterXnotDefine Рік тому

    this video is very useful for me thanks brother

  • @panchakosha
    @panchakosha Рік тому

    Are there any methods to bypass Defender when making a call to the MiniDumpWriteDump API? This method triggers Defender every time.

    • @ActiveXSploit
      @ActiveXSploit Рік тому

      Yes, there are. It probably is detecting the API Call via hooking, you can try to bypass the API hooking process via direct syscalls

  • @nghiaphamtan
    @nghiaphamtan Рік тому

    Tks for sharing 🎉

  • @firewalllife
    @firewalllife Рік тому

    Great tutorial! Thanks for sharing.