Attacking LSASS
Dumping LSASS Process Memory
Task Manager Method
Open Task Manager
> Select the Processes tab
> Find & right click the Local Security Authority Process
> Select Create dump file
A file called lsass.DMP
is created and saved in:
C:\\Users\\loggedonusersdirectory\\AppData\\Local\\Temp
This is the file we will transfer to our attack host
Rundll32.exe & Comsvcs.dll Method
Using Pypykatz to Extract Credentials
Last updated