Dumping passwords in a VMware .vmem file

imageBenjamin Delpy the author of the well known mimikatz toolkit has released a very cool extension to WinDbg today.

In summary the extension can extract Windows passwords from memory dumps, hibernation files and Virtual Machine .vmem files (paging, snapshots).

Especially the ability to extract passwords from .vmem files was very interesting. So I decided to to test this out, so let’s see how it works!

First you need to download and install the Debugging Tool for Windows (WinDbg). Then we’ll need MoonSols Windows Memory toolkit (Free edition suffices) and finally you’ll need to download mimikatz.

Extract bin2dmp.exe from Windows Memory Toolkit and use it to convert a .vmem file to a .dmp file:

SNAGHTML14833be2

Now start WinDbg and load the generated dump file via File -> Open Crash Dump. Load the mimilib.dll file that corresponds to the dump file (32 bit lib for x86 dumps and 64 bit lib for x64 dumps).

eg: .load mimilib.dll

image

Now search for the lsass process (!process 0 0 lsass.exe) and use the returned address:

image

Finally enter !mimikatz and wait for the magic to happen:

image

I have just one word, WOW. Great job by Benjamin again!