LSASS secrets
LSASS Dump - Tools
Require Domain Admin or Local Admin Privileges on target

Task Manager Method

Mimikatz
SafetyKatz
BetterSafetyKatz
SharpKatz
Dumpert (Direct Syscalls and API unhooking)
Rundll32.exe & Comsvcs.dll Method
LSASS PID in cmd: tasklist /svc
LSASS PID in powershell: Get-Process lsass
LSASS dump:
Transfer dump
Download - ExfiltrationTransfer over SMB - as for SAM secrets
SAM & LSA secretsExctract Credentials
Netexec - CME - Remotely
SMB Module handlekatz: [*] handlekatz Get lsass dump using handlekatz64 and parse the result with pypykatz
SMB module procdump: [*] procdump Get lsass dump using procdump64 and parse the result with pypykatz
Procdump
See: https://beta.hackndo.com/remote-lsass-dump-passwords/
Load in Mimikatz and Pass The Hash - See Task Manager Method
TrickDump
MultiDump
Obfuscated LSASS Dump


Parse dump
RustiveDump
LsassReflectDumping
RtlCreateProcessReflection
ShadowDumper

MiniDumpDotNet
tasklist /v to enumerate LSASS PID is detected by EDR
FindLSASSPID.cpp
Nanodump
POSTDump
Powershell - Bypass Defender for Endpoint
Lsass-Shtinkering
Go-lsass
Blindsight
AxiomDumper
Bypass Credential Guard
Credential Guard is a virtualization-based isolation technology for LSASS which prevents attackers from stealing credentials that could be used for pass the hash attacks.
Then run your LSASS dump
LSASS Forked Dump - Bypass Crowdstrike EDR
Morpheus
Extracts lsass.exe in RAM and exfiltrates it via forged NTP packets.
Doppelganger - LSASS Dumper with Process Cloning
Resources
Interesting Book
Interesting BooksPentesting Active Directory and Windows-based Infrastructure Enhance your skill set to pentest against real-world Microsoft infrastructure with hands-on exercises and by following attack/detect guidelines with OpSec considerations
Infrastructure Attack Strategies for Ethical Hacking Encompassing both external and internal enumeration techniques, the book delves into attacking routers and services, establishing footholds, privilege escalation, lateral movement, and exploiting databases and Active Directory.
RTFM: Red Team Field Manual v2 A quick reference when there is no time to scour the Internet for that perfect command
Red Team Development and Operations: A practical guide The authors have moved beyond SANS training and use this book to detail red team operations in a practical guide.
Cybersecurity Attacks – Red Team Strategies A practical guide to building a penetration testing program having homefield advantage
Support this Gitbook
I hope it helps you as much as it has helped me. If you can support me in any way, I would deeply appreciate it.
Last updated


