RunAs-Stealer is a sophisticated credential stealing tool that employs three distinct techniques to capture sensitive user information: Hooking CreateProcessWithLogonW, Smart Keylogging, and Remote Debugging.
This tool operates stealthily in the background, requiring manual termination via Task Manager.
CreateProcessWithLogonW
function, which is used to create a new process with specific credentials. desktop.ini
file located on the user’s desktop. This method allows the data to remain hidden from casual observation.more < "C:\Users\<Username>\Desktop\desktop.ini:log"
.Remove-Item -Path "C:\Users\<Username>\Desktop\desktop.ini" -Stream "log"
.The tool comes with demo videos for each technique, providing visual guidance on how to use and test the features of RunAs-Stealer.
These demos are essential for understanding the full capabilities and potential risks associated with this tool.
RunAs-Stealer highlights the evolving nature of credential theft techniques, emphasizing the need for robust security measures to protect user credentials.
Traditional anti-malware solutions may not be sufficient to prevent such advanced threats, necessitating more specialized security tools and practices to safeguard sensitive information.
AMSI (Antimalware Scan Interface) is a Windows feature designed to help protect systems from malware…
Xkeys is a Burp Suite extension designed to extract interesting strings such as keys, secrets,…
DEDSEC_BOTNET is a Linux-based tool designed for creating and managing advanced botnet payloads. It is…
JS Snitch is a powerful command-line tool designed to scan remote JavaScript files for potential…
The IDOR Scanner is a powerful Burp Suite extension designed to identify potential Insecure Direct…
SubCat is a powerful and efficient tool designed for subdomain discovery, making it an indispensable…