mimipenguin – Dump Login Passwords From Current Linux Users

Mimipenguin is a free and open source, simple yet powerful Shell/Python script used to dump the login credentials (usernames and passwords) from the current Linux desktop user and it has been tested on various Linux distributions.

Additionally, it supports applications such as: VSFTPd (active FTP client connections), Apache2 (active/old HTTP BASIC AUTH sessions but this requires Gcore) and openssh-server (active SSH connections with sudo command usage). Importantly, it’s gradually being ported to numerous languages to support all imaginable post-exploit situations.

How does Mimipenguin Works?

To understand how mimipenguin works, you need to keep in mind that all if not most Linux distributions store a great deal of such critical information as: credentials, encryption keys, as well as personal data in memory.

Particularly usernames and passwords are held by processes (running programs) in memory and stored as plain text for relatively long periods of time. Mimipenguin technically exploits these clear-text credentials in memory – it dumps a process and extracts lines that have a likelihood of accommodating clear-text credentials.

It then tries to perform a calculation of each word’s chances of being present by determining hashes in: /etc/shadow, memory, and regex searches. Once it finds any, it prints them on standard output.

Installing Mimipenguin in Linux Systems

We will use git to clone the mimipenguin repository, so first install git on the system if in case you don’t have it.

$ sudo apt install git 		#Debian/Ubuntu systems
$ sudo yum install git		#RHEL/CentOS systems
$ sudo dnf install git		#Fedora 22+

Then clone the mimipenguin directory in your home folder (any where else) like this:

$ git clone https://github.com/huntergregal/mimipenguin.git

Once you have downloaded the directory, move into it and run mimipenguin as follows:

$ cd mimipenguin/
$ ./mimipenguin.sh 

Note: If you encounter the error below, use the sudo command like so:

Root required - You are dumping memory...
Even mimikatz requires administrator
Dump Login Passwords in Linux

Dump Login Passwords in Linux

From the output above, mimipenguin provides you the desktop environment along with the username and password.

Alternatively, run the Python script as follows:

$ sudo ./mimipenguin.py

Note that sometimes gcore may hang the script (this is a known problem with gcore).

Future Updates

Below is a list of features yet to be added in mimipenguin:

  • Improving overall effectiveness
  • Adding more support and other credential locations
  • Including support for non-desktop environments
  • Adding support for LDAP

mimipenguin Github repository: https://github.com/huntergregal/mimipenguin

Also, check out:

  1. How to Password Protect a Vim File in Linux
  2. How to Generate/Encrypt/Decrypt Random Passwords in Linux
  3. How to Protect GRUB with Password in RHEL / CentOS / Fedora Linux
  4. Resetting/Recovering Forgotten Root User Account Password in CentOS 7

Do share any additional ideas relating to this tool or issues of cleartext credentials in memory in Linux via the comment section below.

Best Affordable Linux and WordPress Services For Your Business
Outsource Your Linux and WordPress Project and Get it Promptly Completed Remotely and Delivered Online.

If You Appreciate What We Do Here On TecMint, You Should Consider:

  1. Stay Connected to: Twitter | Facebook | Google Plus
  2. Subscribe to our email updates: Sign Up Now
  3. Get your own self-hosted blog with a Free Domain at ($3.45/month).
  4. Become a Supporter - Make a contribution via PayPal
  5. Support us by purchasing our premium books in PDF format.
  6. Support us by taking our online Linux courses

We are thankful for your never ending support.

Aaron Kili

Aaron Kili is a Linux and F.O.S.S enthusiast, an upcoming Linux SysAdmin, web developer, and currently a content creator for TecMint who loves working with computers and strongly believes in sharing knowledge.

Your name can also be listed here. Got a tip? Submit it here to become an TecMint author.

RedHat RHCE and RHCSA Certification Book
Linux Foundation LFCS and LFCE Certification Preparation Guide

You may also like...

4 Responses

  1. Arsalan says:

    This is nice! thanks but any ideas on how to secure this?

  2. Eddie G. says:

    I dunno if posting this article was a good idea? You’ve now given someone who may have access to a secure Linux machine the tools (AND instructions!) on how to gain information that the probably shouldn’t have.

    But thanks for the article nonetheless….knowing what I now know after reading this article?…I will do what I can to prevent this from ever being able to run on my Linux boxes. (I guess memory encryption? or just find a way to lock the processes from outside intervention.

    • Aaron Kili says:

      @Eddie G.

      The tool is out there, so any one with malicious thoughts can used it. But we our aim simply to keep Linux users aware of it’s existence and the dangers involved.

      As you have stated, do whatever is possible to prevent this from ever being able to run on your Linux boxes. Thanks for the concern and feedback.

Got something to say? Join the discussion.

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.