Skip to content

RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging

License

Notifications You must be signed in to change notification settings

DarkSpaceSecurity/RunAs-Stealer

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

11 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

RunAs-Stealer

RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging

Usage

The stealers are running in a while loop (the injector also in Hooking case) in the background, to kill them use Task Manager.

The stolen credentials are written to C:\Users\<Username>\Desktop\desktop.ini ADS log stream.

To get the credentials type the cmd command:

more < "C:\Users\<Username>\Desktop\desktop.ini:log"

To remove the stored credentials type the powershell command:

Remove-Item -Path "C:\Users\d1rk\Desktop\desktop.ini" -Stream "log"

N.B: Refer to the Demo down below for each use case

Hooking Demo

runAsHookDemo.mp4

Remote Debugging Demo

runAsDebugDemo.mp4

Smart Keylogging Demo

runasKeylogDemo.mp4

About

RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published