Credential Access & Dumping

Here are the articles in this section:Dumping Credentials from Lsass Process Memory with MimikatzLocal Security Authority (LSA) credential dumping with in-memory Mimikatz using powershell.arrow-up-rightDumping Lsass Without Mimikatzarrow-up-rightDumping Lsass without Mimikatz with MiniDumpWriteDumpEvasion, Credential Dumpingarrow-up-rightDumping Hashes from SAM via RegistrySecurity Accounts Manager (SAM) credential dumping with living off the land binary.arrow-up-rightDumping SAM via esentutl.exearrow-up-rightDumping LSA Secretsarrow-up-rightDumping and Cracking mscash - Cached Domain Credentialsarrow-up-rightDumping Domain Controller Hashes Locally and RemotelyDumping NTDS.dit with Active Directory users hashesarrow-up-rightDumping Domain Controller Hashes via wmic and Vssadmin Shadow Copyarrow-up-rightNetwork vs Interactive LogonsThis lab explores/compares when credentials are susceptible to credential dumping.arrow-up-rightReading DPAPI Encrypted Secrets with Mimikatz and C++arrow-up-rightCredentials in RegistryInternal recon, hunting for passwords in Windows registryarrow-up-rightPassword FilterCredential Accessarrow-up-rightForcing WDigest to Store Credentials in Plaintextarrow-up-rightDumping Delegated Default Kerberos and NTLM Credentials w/o Touching Lsassarrow-up-rightIntercepting Logon Credentials via Custom Security Support Provider and Authentication PackagesCredential Access, Persistencearrow-up-rightPulling Web Application Passwords by Hooking HTML Input FieldsCredential Access, Keyloggerarrow-up-rightIntercepting Logon Credentials by Hooking msv1_0!SpAcceptCredentialsHooking, Credential Stealingarrow-up-rightCredentials Collection via CredUIPromptForCredentialsarrow-up-right

最后更新于

这有帮助吗?