Lsass Dumping

Now we are aware of dumping credentials in memory and running tools on the OS host, but we have offline methods as well, where the operator can dump the lsass process and attack the file offline. One tool that allows us this is the Task Manager itself, it will create a Dumps' file of the process for inspection, but we can grab this file and attack it offline

Requires Administrator Permissions


The file is dumped successfully in the mentioned folder location

We can grab this file and move it offline for dumping credentials

Requires SYSTEM permissions


A LOLBAS is available for dumping the lsass process, the required permission is SYSTEM we can use the following command to dump the process onto a file

rundll32.exe C:\windows\System32\comsvcs.dll, MiniDump PID C:\Users\HelpDesk\Desktop\lsass.dmp full

The PID is of the lsass process

We can do the same with mimikatz and attack the file offline

Requires Administrator permissions


ProcDump from the Sysinternals family, which purpose is for monitoring an application for CPU spikes and generating crash dumps. The tool is simple

Last updated