PwC安全技术小组
搜索...
Ctrl
K
技术
技术 - 红队攻击手段介绍
offensive-security
Credential Access & Dumping
上一页
Privilege Escalation
下一页
Lateral Movement
最后更新于
4年前
这有帮助吗?
Here are the articles in this section:
Dumping Credentials from Lsass Process Memory with MimikatzLocal Security Authority (LSA) credential dumping with in-memory Mimikatz using powershell.
Dumping Lsass Without Mimikatz
Dumping Lsass without Mimikatz with MiniDumpWriteDumpEvasion, Credential Dumping
Dumping Hashes from SAM via RegistrySecurity Accounts Manager (SAM) credential dumping with living off the land binary.
Dumping SAM via esentutl.exe
Dumping LSA Secrets
Dumping and Cracking mscash - Cached Domain Credentials
Dumping Domain Controller Hashes Locally and RemotelyDumping NTDS.dit with Active Directory users hashes
Dumping Domain Controller Hashes via wmic and Vssadmin Shadow Copy
Network vs Interactive LogonsThis lab explores/compares when credentials are susceptible to credential dumping.
Reading DPAPI Encrypted Secrets with Mimikatz and C++
Credentials in RegistryInternal recon, hunting for passwords in Windows registry
Password FilterCredential Access
Forcing WDigest to Store Credentials in Plaintext
Dumping Delegated Default Kerberos and NTLM Credentials w/o Touching Lsass
Intercepting Logon Credentials via Custom Security Support Provider and Authentication PackagesCredential Access, Persistence
Pulling Web Application Passwords by Hooking HTML Input FieldsCredential Access, Keylogger
Intercepting Logon Credentials by Hooking msv1_0!SpAcceptCredentialsHooking, Credential Stealing
Credentials Collection via CredUIPromptForCredentials