{"id":4483,"date":"2017-04-08T01:27:01","date_gmt":"2017-04-07T17:27:01","guid":{"rendered":"https:\/\/www.darknet.org.uk\/?p=4483"},"modified":"2017-04-08T01:29:55","modified_gmt":"2017-04-07T17:29:55","slug":"powermemory-exploit-windows-credentials-memory","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2017\/04\/powermemory-exploit-windows-credentials-memory\/","title":{"rendered":"PowerMemory – Exploit Windows Credentials In Memory"},"content":{"rendered":"

PowerMemory is a PowerShell based tool to exploit Windows credentials present in files and memory, it levers Microsoft signed binaries to hack Windows.<\/p>\n

\"PowerMemory<\/p>\n

The method is totally new. It proves that it can be extremely easy to get credentials or any other information from Windows memory without needing to code in C-type languages. In addition, with this method, we can modify the user-land and kernel land behaviour without being caught by antivirus or new defending techniques.<\/p>\n

It can actually be done with 4GL language-type or with a scripting language like PowerShell which is installed everywhere.<\/p>\n

With that being said, this technique implies that the detection is made hard due to the fact that we can do pretty much what we want by sending and receiving bytes.<\/p>\n