Post Exploitation

Red teaming Windows machines after gaining Administrator

Windows

Searching for keywords in Windows Registry:

Run command prompt as another user if you know their password:

Active Directory

Enumerating users:

Dumping Credentials

LSASS

Local Security Authority Service (LSASS) is a Windows process that handles the operating system security policy and enforce it on a system. It verifies logged in accounts and ensure passwords, hashes, and Kerberos tickets. Windows stores credentials in the LSASS process to enable users to access network resources, such as file shares, SharePoint sites, and other network services. It can also be used to dump credentials to either escalate privileges, steal data, or move laterally. With administrator privilege, the process memory of LSASS can be dumped and used to create a dump file, a snapshot of a given process.

This can be manually done or can be quickly done with Mimikatz. In some cases, there will be protected LSASS. This will require an additional driver called mimidrv.sys that works on a kernel level to disable the LSA protection

Last updated