The Local Security Authority Subsystem Service (LSASS) is a Windows service responsible for enforcing the security policy on the system. It verifies users logging in, handles password changes and creates access tokens. Those operations lead to the storage of credential material in the process memory of LSASS. With administrative rights only, this material can be harvested (either locally or remotely).
Practice
Lsassy (Python) can be used to remotely extract credentials, from LSASS, on multiple hosts. As of today (22/07/2020), it is the Rolls-Royce of remote lsass credential harvesting.
# (Locally) extract credentials from LSASS process memorysekurlsa::logonpasswords# (Remotely) analyze a memory dumpsekurlsa::minidumplsass.dmpsekurlsa::logonpasswords
For Windows 2000, a special version of mimikatz called mimilove can be used.
Pypykatz (Python) can be used remotely (i.e. offline) to analyze a memory dump (dumped with ProcDump for example).
Windows Defender is triggered when a memory dump of lsass is operated, quickly leading to the deletion of the dump. Using lsass's process identifier (pid) "bypasses" that.