LSASS secrets
MITRE ATT&CK™ Sub-technique T1003.001
Last updated
Was this helpful?
MITRE ATT&CK™ Sub-technique T1003.001
Last updated
Was this helpful?
The Local Security Authority Subsystem Service (LSASS) is a Windows service responsible for enforcing the security policy on the system. It verifies users logging in, handles password changes and creates access tokens. Those operations lead to the storage of credential material in the process memory of LSASS. With administrative rights only, this material can be harvested (either locally or remotely).
(Python) can be used to remotely extract credentials, from LSASS, on multiple hosts. As of today (22/07/2020), it is the Rolls-Royce of remote lsass credential harvesting.
several dumping methods: comsvcs.dll, ,
several authentication methods: like (NTLM), or (Kerberos)
it can be used either as a standalone script, as a module or as a Python library
it can interact with a Neo4j database to set targets as "owned"
(Python) can be used remotely (i.e. offline) to analyze a memory dump (dumped with for example).
The legitimate tool (from ) () can be used to dump lsass's process memory.
Once the memory dump is finished, it can be analyzed with (Windows) or (Python, cross-platform).
's exfiltration script (PowerShell) can be used to extract credential material from LSASS's process memory.
Recovered credential material could be either plaintext passwords or NT hash that can be used with (depending on the context).