LSASS secrets

LSASS Dump - Tools

ko-fi

Task Manager Method

Pass the Hash (PtH)

Mimikatz

SafetyKatz

BetterSafetyKatz

SharpKatz

Dumpert (Direct Syscalls and API unhooking)

Rundll32.exe & Comsvcs.dll Method

LSASS PID in cmd: tasklist /svc

LSASS PID in powershell: Get-Process lsass

LSASS dump:

Transfer dump

Download - Exfiltration

Transfer over SMB - as for SAM secrets

SAM & LSA secrets

Exctract Credentials

Netexec - CME - Remotely

SMB Module handlekatz: [*] handlekatz Get lsass dump using handlekatz64 and parse the result with pypykatz

SMB module procdump: [*] procdump Get lsass dump using procdump64 and parse the result with pypykatz

Procdump

See: https://beta.hackndo.com/remote-lsass-dump-passwords/

Load in Mimikatz and Pass The Hash - See Task Manager Method

TrickDump

MultiDump

Obfuscated LSASS Dump

Parse dump

RustiveDump

LsassReflectDumping

RtlCreateProcessReflection

ShadowDumper

MiniDumpDotNet

tasklist /v to enumerate LSASS PID is detected by EDR

FindLSASSPID.cpp

Nanodump

POSTDump

Powershell - Bypass Defender for Endpoint

Lsass-Shtinkering

Works on Windows 10, Server 2022 - Not working on Server 2019

Go-lsass

Blindsight

AxiomDumper

Bypass Credential Guard

Credential Guard is a virtualization-based isolation technology for LSASS which prevents attackers from stealing credentials that could be used for pass the hash attacks.

Then run your LSASS dump

LSASS Forked Dump - Bypass Crowdstrike EDR

Morpheus

Extracts lsass.exe in RAM and exfiltrates it via forged NTP packets.

Doppelganger - LSASS Dumper with Process Cloning

Resources

Interesting Book

Interesting Books

Disclaimer: As an Amazon Associate, I earn from qualifying purchases. This helps support this GitBook project at no extra cost to you.

Support this Gitbook

I hope it helps you as much as it has helped me. If you can support me in any way, I would deeply appreciate it.

ko-fi

buymeacoffee

Last updated