OS Credential Dumping (T1003)
The crown jewels are in memory.
1. LSASS Memory
The Local Security Authority Subsystem Service (lsass.exe) holds NTLM hashes and Kerberos tickets.
Dumping Tools
- Mimikatz:
sekurlsa::logonpasswords(Flagged by everything). - Procdump:
procdump -ma lsass.exe out.dmp(Microsoft signed tool). - Comsvcs.dll:
rundll32.exe C:\windows\System32\comsvcs.dll, MiniDump <PID> lsass.dmp full(Living off the Land).
Evasion
- Lsassy: Dumps remotely using valid admin credentials.
- Handle Duplication: Don't open a new handle to LSASS. Find an existing one and clone it.
2. DCSync (Domain Controller)
If you have Domain Admin rights, you can ask the DC to replicate password data to you.
- Protocol: MS-DRSR (Directory Replication Service Remote).
- Command:
lsadump::dcsync /domain:target.com /user:krbtgt - Result: You get the NTLM hash of any user without touching
lsass.exeon the DC.
3. LSA Secrets
Registry keys that hold service account passwords.
- Key:
HKLM\SECURITY\Policy\Secrets - Content: Passwords for services running as users.