• Home
  • Become a Hacker
    • Get Started
    • Hacker Mindset
    • Roadmap
    • Simple Setup – Hacker 101
    • Types of Hackers
    • Recommended Courses
  • Boot People Offline
  • Courses
    • All Hacking Courses
    • Cyber Security School
  • CTF
    • Beginners to Advanced Guide
    • Create your own CTF box
    • Field and Resources Guide
    • Platforms & Wargames
    • Tools Used for Solving CTF
    • Writeups
  • Dark Web
    • Beginners Guide
    • Darknet Markets
    • Darkweb 101 (Anonymity Guide)
    • Dark Web OSINT Tools
    • Hacking Forums
    • Latest News
    • Onion Links
  • Hacker Gadgets
  • Hacking Books
  • Tools Directory
Menu
  • Home
  • Become a Hacker
    • Get Started
    • Hacker Mindset
    • Roadmap
    • Simple Setup – Hacker 101
    • Types of Hackers
    • Recommended Courses
  • Boot People Offline
  • Courses
    • All Hacking Courses
    • Cyber Security School
  • CTF
    • Beginners to Advanced Guide
    • Create your own CTF box
    • Field and Resources Guide
    • Platforms & Wargames
    • Tools Used for Solving CTF
    • Writeups
  • Dark Web
    • Beginners Guide
    • Darknet Markets
    • Darkweb 101 (Anonymity Guide)
    • Dark Web OSINT Tools
    • Hacking Forums
    • Latest News
    • Onion Links
  • Hacker Gadgets
  • Hacking Books
  • Tools Directory
Search
Close
  • Home
  • 2018
  • January
  • 25
  • Redsnarf – Windows Penetration Testing Tool

Redsnarf – Windows Penetration Testing Tool

January 25, 2018July 27, 2019 Comments Off on Redsnarf – Windows Penetration Testing Tool
creddump with redsnarf hacking with redsnarf hash snarf how to use redsnarf redsnarf redsnarf tutorial

RedSnarf is a pen-testing / red-teaming tool by Ed William and Richard Davy for retrieving hashes and credentials from Windows workstations, servers and domain controllers using OpSec Safe Techniques.

 

RedSnarf aims to do the following:

  • Leave no evidence on the host of intrusion/exfiltration – this includes files, processes and services;
  • Not cause undue damage to the host i.e. forcing the host to re-boot

 

 

Why use RedSnarf?

Currently there are a number of excellent “post-exploitation” tools; these include the smbexec and Metasploit post-exploitation modules to name but a few.

RedSnarf differs in that:

  • It’s easy to use
  • It’s lightweight at less than 500 lines of code
  • It does as little on the server as possible
  • It’s modular
  • It’s threaded

     RedSnarf is a pen-testing / red-teaming tool by Ed William and Richard Davy for retrieving hashes and credentials from Windows workstations, servers and domain controllers using OpSec Safe Techniques.

 

RedSnarf functionality includes:

• Retrieval of local SAM hashes
• Enumeration of user/s running with elevated system privileges and their corresponding lsa secrets password;
• Retrieval of MS cached credentials;
• Pass-the-hash;
• Quickly identify weak and guessable username/password combinations (default of administrator/Password01);
• The ability to retrieve hashes across a range;
• Hash spraying –
Credsfile will accept a mix of pwdump, fgdump and plain text username and password separated by a space;
• Lsass dump for offline analysis with Mimikatz;
• Dumping of Domain controller hashes using NTDSUtil and retrieval of NTDS.dit for local parsing;
• Dumping of Domain controller hashes using the drsuapi method;
• Retrieval of Scripts and Policies folder from a Domain controller and parsing for ‘password’ and ‘administrator’;
• Ability to decrypt cpassword hashes;
• Ability to start a shell on a remote machine;
• The ability to clear the event logs (application, security, setup or system); (Internal Version only)
• Results are saved on a per-host basis for analysis.
• Enable/Disable RDP on a remote machine.
• Change RDP port from 3389 to 443 on a remote machine.
• Enable/Disable NLA on a remote machine.
• Find where users are logged in on remote machines.
• Backdoor Windows Logon Screen
• Enable/Disable UAC on a remote machine.
• Stealth mimikatz added.
• Parsing of domain hashes
• Ability to determine which accounts are enabled/disabled
• Take a screen shot of a Remote logged on Active Users Desktop
• Record Remote logged on Active Users Desktop
• Decrypt Windows CPassword
• Decrypt WinSCP Password
• Get User SPN’s
• Retrieve WIFI passwords from remote machines

 

Windows Penetration Testing Tool: RedSnarf

 

Development & Dependencies

RedSnarf was developed on the following environment:

  • Kali Linux
  • python 2.7.9
    • termcolor (1.1.0), it does help, honestly!

 

Requirements:

  • Impacket v0.9.16-dev – https://github.com/CoreSecurity/impacket.git
  • CredDump7 – https://github.com/Neohapsis/creddump7
  • Lsass Retrieval using procdump – https://technet.microsoft.com/en-us/sysinternals/dd996900.aspx
  • Netaddr (0.7.12) – pip install netaddr
  • Termcolor (1.1.0) – pip install termcolor
  • iconv – used with parsing Mimikatz info locally

 

Show Help

./redsnarf.py -h
./redsnarf.py --help

 

Windows Penetration Testing Tool: RedSnarf Documentation

Windows Penetration Testing Tool: RedSnarf Download

Post navigation

Bettercap – Extensible MITM Framework
Belati – Traditional OSINT Swiss Army Knife

Related Articles

RedCloud – Powerful Red Team Infrastructure deployment using Docker

- Pentesting
October 31, 2019

TikiTorch – Process Injection Tool

- Privilege Escalation
October 28, 2019

Postenum – Basic/Advanced Privilege Escalation Techniques

- Privilege Escalation
July 28, 2019
hacker gadgets
hacker phone covers

Recent Posts

CVE-2022-2590: Linux kernel privilege escalation vulnerability

CVE-2022-2590: Linux kernel privilege escalation vulnerability

August 9, 2022
Beanshooter v3.0 releases: identify common vulnerabilities on JMX endpoints

Beanshooter v3.0 releases: identify common vulnerabilities on JMX endpoints

August 9, 2022
US Treasury Sanctioned Tornado Cash

US Treasury Sanctioned Tornado Cash

August 9, 2022
PersistenceSniper: hunt persistences implanted in Windows machines

PersistenceSniper: hunt persistences implanted in Windows machines

August 8, 2022
BTC-e Owner Extradited to the United States

BTC-e Owner Extradited to the United States

August 8, 2022
MrKaplan: tool for red teamers to stay hidden by clearing evidence of execution

MrKaplan: tool for red teamers to stay hidden by clearing evidence of execution

August 8, 2022

Social Media Hacking

SocialPath – Track users across Social Media Platforms

SocialPath – Track users across Social Media Platforms

- Social Media Hacking
October 16, 2019October 16, 2019

SocialPath is a django application for gathering social media intelligence on specific username. It checks for Twitter, Instagram, Facebook, Reddit...

SocialScan – Check Email Address and Username Availability on Online Platforms

SocialScan – Check Email Address and Username Availability on Online Platforms

June 17, 2019
Shellphish – Phishing Tool For 18 Social Media Apps

Shellphish – Phishing Tool For 18 Social Media Apps

June 10, 2019July 27, 2019
WhatsApp Hacking using QRLJacking

WhatsApp Hacking using QRLJacking

May 2, 2019May 19, 2019
How to Hack any Facebook Account with Z-Shadow

How to Hack any Facebook Account with Z-Shadow

April 26, 2019June 29, 2020
hacker buffs

About Us

Haxf4rall is a collective, a good starting point and provides a variety of quality material for cyber security professionals.

Join Our Community!

Please wait...
Get the latest News and Hacking Tools delivered to your inbox.
Don't Worry ! You will not be spammed

Active Members

Submit a Tool

Hackers Handbook 2018


Grab your copy here

ABOUT US

Haxf4rall is a collective, a good starting point and provides a variety of quality material for cyber security professionals.

Our primary focus revolves around the latest tools released in the Infosec community and provide a platform for developers to showcase their skillset and current projects.

COMPANY
  • Contact Us
  • Disclaimer
  • Hacker Gadgets
  • LANC Remastered
  • PCPS IP Puller
  • Privacy Policy
  • Sitemap
  • Submit your Tool
Menu
  • Contact Us
  • Disclaimer
  • Hacker Gadgets
  • LANC Remastered
  • PCPS IP Puller
  • Privacy Policy
  • Sitemap
  • Submit your Tool
Live Chat
RESOURCES
  • Attack Process
  • Become a Hacker
  • Career Pathways
  • Dark Web
  • Hacking Books
  • Practice Your Skills
  • Recommended Courses
  • Simple Setup – Hacker 101
Menu
  • Attack Process
  • Become a Hacker
  • Career Pathways
  • Dark Web
  • Hacking Books
  • Practice Your Skills
  • Recommended Courses
  • Simple Setup – Hacker 101
Get Started
TOOLBOX
  • Anonymity
  • Bruteforce
  • DoS – Denial of Service
  • Information Gathering
  • Phishing
  • SQL Injection
  • Vulnerability Scanners
  • Wifi Hacking
Menu
  • Anonymity
  • Bruteforce
  • DoS – Denial of Service
  • Information Gathering
  • Phishing
  • SQL Injection
  • Vulnerability Scanners
  • Wifi Hacking
Tools Directory

2014 – 2020 | Haxf4rall.com               Stay Connected:

Facebook Twitter Google-plus Wordpress
Please wait...

Join Our Community

Subscribe now and get your free HACKERS HANDBOOK

Don't Worry ! You will not be spammed
SIGN UP FOR NEWSLETTER NOW