How Does It Work?

  • The DLL is first injected into the lsass.exe process, where it will begin intercepting authentication WinAPI calls.
  • MsvpPasswordValidate(), found in NtlmShared.dll, is the targeted function.
  • In order to avoid being noticed, the hooked function will call the original function and let the authentication process to proceed normally.
  • The hook will only swap out the true NTLM hash with the backdoor hash for comparison after it has determined that authentication has failed.

 

Disclaimer: The intended use for the tool is strictly educational and should not be used for any other purposes.

 

Download Link: https://github.com/kindtime/nosferatu

This site is under maintenance,
some features might not work!!!