Skip to content

Reimplementing mimipenguin in Rust - Discovering Plaintext Passwords Within Process Memory

License

Notifications You must be signed in to change notification settings

Akshay-Rohatgi/rustpenguin

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

8 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

rustpenguin

rustpenguin is a Rust-based port of the mimipenguin tool, originally developed by Hunter Gregal. Inspired by the popular Windows security tool Mimikatz, Rustpenguin aims to extract plaintext credentials from process memory on Linux systems.

example

Overview

Blazing Fast: Completes the search for credentials in just a few seconds, significantly faster than the original Python and shell versions.
Memory Dumping: Extracts readable memory regions from vulnerable processes like Gnome Keyring.
Regex-Based Search: Utilizes researched regex patterns ("needles") to find potential passwords within the dumped memory.
Password Verification: Matches potential passwords against hashes in /etc/shadow to confirm valid credentials.

For more details, check out my blog post here!

Suppported Systems

rustpenguin has only been tested on Ubuntu Desktop 20.04 so far. The vulnerabilities in the applications it exploits seem to have been patched by the default versions available in Ubuntu 22.04.

Building

Clone the repository and run the following command in the project root:

cargo build --release

This will generate a rustpenguin executable in the target/release directory.

Usage

Run the executable with root permissions:

sudo ./rustpenguin

The tool will automatically identify vulnerable processes and attempt to extract and verify plaintext passwords.

About

Reimplementing mimipenguin in Rust - Discovering Plaintext Passwords Within Process Memory

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages