Attacking LSASS
Dumping LSASS Process Memory
β
Method 1: Task Manager
β
Method 2: Rundll32.exe & Comsvcs.dll
Moving the File to the attacker
Using Pypykatz to Extract Credentials
Pypykatz Output Breakdown
π MSV (MSV1_0)
π WDIGEST
π·οΈ Kerberos
π DPAPI (Data Protection API)
Application
Usage
Cracking the NT Hash with Hashcat
Last updated