Red Teaming Experiments
Red Teaming Experiments
linkedin
github
@spotheplanet
patreon
What is ired.team?
Pinned
Pentesting Cheatsheets
Active Directory & Kerberos Abuse
offensive security
Red Team Infrastructure
Initial Access
Code Execution
Code & Process Injection
Defense Evasion
Enumeration and Discovery
Privilege Escalation
Credential Access & Dumping
Dumping Credentials from Lsass Process Memory with Mimikatz
Dumping Lsass Without Mimikatz
Dumping Lsass without Mimikatz with MiniDumpWriteDump
Dumping Hashes from SAM via Registry
Dumping SAM via esentutl.exe
Dumping LSA Secrets
Dumping and Cracking mscash - Cached Domain Credentials
Dumping Domain Controller Hashes Locally and Remotely
Dumping Domain Controller Hashes via wmic and Vssadmin Shadow Copy
Network vs Interactive Logons
Reading DPAPI Encrypted Secrets with Mimikatz and C++
Credentials in Registry
Password Filter
Forcing WDigest to Store Credentials in Plaintext
Dumping Delegated Default Kerberos and NTLM Credentials w/o Touching Lsass
Intercepting Logon Credentials via Custom Security Support Provider and Authentication Packages
Pulling Web Application Passwords by Hooking HTML Input Fields
Intercepting Logon Credentials by Hooking msv1_0!SpAcceptCredentials
Credentials Collection via CredUIPromptForCredentials
Lateral Movement
Persistence
Exfiltration
reversing, forensics & misc
Windows / OS Internals
Cloud
Neo4j
Dump Virtual Box Memory
AES Encryption Using Crypto++ .lib in Visual Studio C++
Reversing Password Checking Routine
Powered by GitBook

Credential Access & Dumping

Here are the articles in this section:
Dumping Credentials from Lsass Process Memory with Mimikatz
Local Security Authority (LSA) credential dumping with in-memory Mimikatz using powershell.
Dumping Lsass Without Mimikatz
Dumping Lsass without Mimikatz with MiniDumpWriteDump
Evasion, Credential Dumping
Dumping Hashes from SAM via Registry
Security Accounts Manager (SAM) credential dumping with living off the land binary.
Dumping SAM via esentutl.exe
Dumping LSA Secrets
Dumping and Cracking mscash - Cached Domain Credentials
Dumping Domain Controller Hashes Locally and Remotely
Dumping NTDS.dit with Active Directory users hashes
Dumping Domain Controller Hashes via wmic and Vssadmin Shadow Copy
Network vs Interactive Logons
This lab explores/compares when credentials are susceptible to credential dumping.
Reading DPAPI Encrypted Secrets with Mimikatz and C++
Credentials in Registry
Internal recon, hunting for passwords in Windows registry
Password Filter
Credential Access
Forcing WDigest to Store Credentials in Plaintext
Dumping Delegated Default Kerberos and NTLM Credentials w/o Touching Lsass
Intercepting Logon Credentials via Custom Security Support Provider and Authentication Packages
Credential Access, Persistence
Pulling Web Application Passwords by Hooking HTML Input Fields
Credential Access, Keylogger
Intercepting Logon Credentials by Hooking msv1_0!SpAcceptCredentials
Hooking, Credential Stealing
Credentials Collection via CredUIPromptForCredentials
Previous
Weak Service Permissions
Next
Dumping Credentials from Lsass Process Memory with Mimikatz
Last updated 2 years ago