Whisker
MIT๐ฅ Offensive Ops ยท C#
Whisker is a C# tool for performing the Shadow Credentials attack against Active Directory. The attack exploits the msDS-KeyCredentialLink attribute introduced for Windows Hello for Business, which allows certificate-based authentication via Kerberos PKINIT. By adding a rogue Key Credential entry to a target user or computer's msDS-KeyCredentialLink attribute (which requires write access to the attribute), an attacker can then authenticate as that principal using the corresponding private key, without knowing or changing their password. This is stealthier than traditional credential attacks because it doesn't modify the password or trigger password change events. Whisker generates the key pair, adds the Key Credential to the target, and can be combined with Rubeus to request TGTs using the shadow credential. It's particularly effective when you have GenericWrite or GenericAll permissions over user or computer objects.
Installation
from source
$ git clone https://github.com/eladshamir/Whisker && cd Whisker && dotnet buildUse Cases
- Adding shadow credentials to AD objects for stealthy Kerberos authentication
- Persisting access without modifying passwords or triggering change events
- Lateral movement via Key Credential abuse when GenericWrite is available
- Testing Active Directory environments for shadow credential attack exposure
- Combining with Rubeus for certificate-based TGT requests after credential injection
Tags
Details
- Category
- ๐ฅ Offensive Ops
- Language
- C#
- Repository
- eladshamir/Whisker
- License
- MIT
- Platforms
- ๐ชwindows
Links
Alternatives & Comparisons
Impacket
PythonCollection of Python classes for working with network protocols. Essential for Windows/AD pentesting.
Compare Whisker vs ImpacketRubeus
C#C# toolset for raw Kerberos interaction and abuse. AS-REP roasting, Kerberoasting, ticket manipulation, delegation attacks.
Compare Whisker vs RubeusMore in Offensive Ops
Mythic
GoCollaborative, multi-platform C2 framework. Docker-based with web UI, multiple agent types, and plugin architecture.
Havoc
C/C++Modern C2 framework. Qt-based GUI, BOF support, custom agents, and a Cobalt Strike-inspired workflow.
Rubeus
C#C# toolset for raw Kerberos interaction and abuse. AS-REP roasting, Kerberoasting, ticket manipulation, delegation attacks.
Certipy
PythonActive Directory Certificate Services (AD CS) abuse tool. Find and exploit certificate template misconfigurations.
Coercer
PythonAutomatically find and exploit Windows authentication coercion vulnerabilities. PetitPotam, PrinterBug, and more.
SharpHound
C#Official BloodHound data collector. Enumerates Active Directory objects, sessions, ACLs, and trusts for graph analysis.