Red Team Notes
search
⌘Ctrlk
Red Team Notes
  • What is ired.team notes?
  • Pinned
    • Pentesting Cheatsheets
    • Active Directory & Kerberos Abuse
  • offensive security
    • Red Team Infrastructure
    • Initial Access
    • Code Execution
    • Code & Process Injection
    • Defense Evasion
    • Enumeration and Discovery
    • Privilege Escalation
    • Credential Access & Dumping
      • Dumping Credentials from Lsass Process Memory with Mimikatz
      • Dumping Lsass Without Mimikatz
      • Dumping Lsass without Mimikatz with MiniDumpWriteDump
      • Dumping Hashes from SAM via Registry
      • Dumping SAM via esentutl.exe
      • Dumping LSA Secrets
      • Dumping and Cracking mscash - Cached Domain Credentials
      • Dumping Domain Controller Hashes Locally and Remotely
      • Dumping Domain Controller Hashes via wmic and Vssadmin Shadow Copy
      • Network vs Interactive Logons
      • Reading DPAPI Encrypted Secrets with Mimikatz and C++
      • Credentials in Registry
      • Password Filter
      • Forcing WDigest to Store Credentials in Plaintext
      • Dumping Delegated Default Kerberos and NTLM Credentials w/o Touching Lsass
      • Intercepting Logon Credentials via Custom Security Support Provider and Authentication Packages
      • Pulling Web Application Passwords by Hooking HTML Input Fields
      • Intercepting Logon Credentials by Hooking msv1_0!SpAcceptCredentials
      • Credentials Collection via CredUIPromptForCredentials
    • Lateral Movement
    • Persistence
    • Exfiltration
  • reversing, forensics & misc
    • Internals
    • Cloud
    • Neo4j
    • Dump Virtual Box Memory
    • AES Encryption Using Crypto++ .lib in Visual Studio C++
    • Reversing Password Checking Routine
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. offensive security

Credential Access & Dumping

Dumping Credentials from Lsass Process Memory with Mimikatzchevron-rightDumping Lsass Without Mimikatzchevron-rightDumping Lsass without Mimikatz with MiniDumpWriteDumpchevron-rightDumping Hashes from SAM via Registrychevron-rightDumping SAM via esentutl.exechevron-rightDumping LSA Secretschevron-rightDumping and Cracking mscash - Cached Domain Credentialschevron-rightDumping Domain Controller Hashes Locally and Remotelychevron-rightDumping Domain Controller Hashes via wmic and Vssadmin Shadow Copychevron-rightNetwork vs Interactive Logonschevron-rightReading DPAPI Encrypted Secrets with Mimikatz and C++chevron-rightCredentials in Registrychevron-rightPassword Filterchevron-rightForcing WDigest to Store Credentials in Plaintextchevron-rightDumping Delegated Default Kerberos and NTLM Credentials w/o Touching Lsasschevron-rightIntercepting Logon Credentials via Custom Security Support Provider and Authentication Packageschevron-rightPulling Web Application Passwords by Hooking HTML Input Fieldschevron-rightIntercepting Logon Credentials by Hooking msv1_0!SpAcceptCredentialschevron-rightCredentials Collection via CredUIPromptForCredentialschevron-right
PreviousWeak Service Permissionschevron-leftNextDumping Credentials from Lsass Process Memory with Mimikatzchevron-right

Last updated 6 years ago