Attacking LSASS
LSASS (Local Security Authority Subsystem Service) is a critical Windows service responsible for:
Caching credentials in memory
Creating access tokens
Enforcing security policies
Writing security logs
Accessing LSASS process memory can expose sensitive authentication data such as hashes and plaintext credentials.
Dumping LSASS Process Memory
To extract credentials, we first create a memory dump of the LSASS process. This allows offline analysis, minimizing time spent on the target system and avoiding detection.
β
Method 1: Task Manager
Steps:
Open Task Manager
Go to the Processes tab
Locate Local Security Authority Process (lsass.exe)
Right-click β Create dump file
Dump Location:
π€ Transfer the dump to your attack machine using a file transfer method from the Attacking SAM section.
β
Method 2: Rundll32.exe & Comsvcs.dll
Useful in CLI-only environments and faster than GUI.
π Step 1: Find LSASS PID
CMD:
PowerShell:
Example Output:
πΎ Step 2: Dump LSASS
PowerShell (Admin):
β Modern antivirus solutions may block this method. AV bypassing is outside this moduleβs scope.
Using Pypykatz to Extract Credentials
Run Command:
Pypykatz Output Breakdown
π MSV (MSV1_0)
Used to authenticate against the SAM database.
π WDIGEST
An older authentication protocol. If enabled, may contain cleartext passwords.
π WDIGEST is disabled by default on modern Windows versions.
π·οΈ Kerberos
Used in Active Directory environments. LSASS may store:
Tickets
Credentials
Encryption keys (ekeys)
π DPAPI (Data Protection API)
Used to encrypt/decrypt sensitive data across apps:
Internet Explorer
Saved form data
Google Chrome
Saved passwords
Outlook
Email account passwords
Remote Desktop
Saved session credentials
Credential Manager
Wi-Fi, VPN, and network credentials
π This masterkey can decrypt data protected by DPAPI.
Cracking the NT Hash with Hashcat
We can now crack the NT hash extracted via Pypykatz.
Command:
Result:
β Password successfully cracked β attack completed.
Last updated