Upon initial logon, LSASS will:
Dumping
TaskManager
When with GUI:
Open Task Manager
> Select the Processes tab
> Find & right click the Local Security Authority Process
> Select Create dump file
lsass.DMP is saved in:
Dundll32.exe Conmsvcs.dll
Faster and more accessible method compared to TaskManager method since it only requires CLI.
But it is diagnosed as malicious by most of modern anti-virus system.
- Look for process ID(PID) related assigned to lsass.exe
In powershell:
- Create lsass.dmp
Once we have the dump transferred to attacker machine, there’s a lot we can do.
Pypykatz
Mimikatz written in Python.
Benefit: We can run it offline from our Linux based attacker machine.