Тёмный

LSASS Dumping Using DFIR Tools 

Cyber Attack & Defense
Подписаться 4,7 тыс.
Просмотров 2 тыс.
50% 1

Опубликовано:

 

2 окт 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 34   
@HAMETE
@HAMETE 4 месяца назад
As always. This channel is gold. Thanks!
@AharonMoshe-m2g
@AharonMoshe-m2g 2 месяца назад
Thanks!!
@eladfern
@eladfern 4 месяца назад
Great video !!! Unfortunately Microsoft requirements for Credential Guard are pretty "heavy". For example it will work only on windows Enterprise edition.
@CyberAttackDefense
@CyberAttackDefense 4 месяца назад
Very true! This is the reason many orgs didn’t implement this control. Implement where possible.
@niksphd2742
@niksphd2742 2 месяца назад
I'm glad I watched this. What privileges did you need to run that .exe and successfully dump lsass? Steps up to that would be flagged easily. Our soc would also see that being run and notify the client.
@CyberAttackDefense
@CyberAttackDefense 2 месяца назад
You would need to escalate to local admin level or a level that can install software. Saying your SOC would see this unless your running application allow listing or have SIEM rules in place isn’t a given. You should test this scenario.
@cyberadvent
@cyberadvent 4 месяца назад
This was amazing and I will be using this lol thank you!
@alexanderdell2623
@alexanderdell2623 4 месяца назад
Man, stop burning tools just like that😅
@CyberAttackDefense
@CyberAttackDefense 4 месяца назад
Oh I have better! Not burning my real secrets
@BEAST4LIF3
@BEAST4LIF3 4 месяца назад
Funny I used the same technique with remote magnet capture but had trouble parsing out lsass with volatility. SAM worked great.
@CyberAttackDefense
@CyberAttackDefense 4 месяца назад
I have done similar remotely with PCIleach installed as a service.
@BEAST4LIF3
@BEAST4LIF3 4 месяца назад
@@CyberAttackDefense sounds similar to phymem2profit maybe? BTW what is the best way to reach you. I am a solo operator right now and always need people to bounce ideas off of😅.
@CyberAttackDefense
@CyberAttackDefense 4 месяца назад
Twitter DM
@franciscog7110
@franciscog7110 4 месяца назад
This is a great share. I am using it and dumped the RAM, and from it the SAM hashes using volatility3. However, it would be more useful to get the actual NTLM hashes of the AD users, and this is not in the LSA secrets method from volatility3. I thought, that maybe if I carved out somehow the process data from the Lsass.exe that is in the RAM dump it would be possible to analyze it with mimikatz minidump locally. But it just fails. Am I doing something that makes no sense?
@CyberAttackDefense
@CyberAttackDefense 4 месяца назад
The hashes from volatility are the ntlm hashes. You can crack or pass them.
@franciscog7110
@franciscog7110 4 месяца назад
thank you for the reply​@@CyberAttackDefense. I get the local user hashes from the volatility3 plugin windows.hashdump and mimikatz returns also the NT hashes of the AD users in the same host. So I was wondering if it is possible to convert the output from Winpmem and use it on mimikatz offline. I know the DA NTLM hash is there, and then just need to pass it to end the test
@CyberAttackDefense
@CyberAttackDefense 4 месяца назад
@@franciscog7110 You can dump the process with volatility and run mimikatz against it. Did you try using memdump? or if you have an older version of volatility there is a mimikatz plugin.
@Goun-hn6uv
@Goun-hn6uv 4 месяца назад
Then how to bypass credential guard?
@CyberAttackDefense
@CyberAttackDefense 4 месяца назад
So you can’t really bypass credential guard. There are some other methods but the closest I have seen was what Oliver Lyak did here. research.ifcr.dk/pass-the-challenge-defeating-windows-defender-credential-guard-31a892eee22
@Goun-hn6uv
@Goun-hn6uv 4 месяца назад
@@CyberAttackDefense thanks for sharing!
@erwin166
@erwin166 4 месяца назад
Great!!, I like computer forensic, and I will keep this topic in mind.
@gunnerysergeant8889
@gunnerysergeant8889 4 месяца назад
Was that from a low-priv user??
@CyberAttackDefense
@CyberAttackDefense 4 месяца назад
No this is assuming admin. Find an escalation path first.
@gunnerysergeant8889
@gunnerysergeant8889 4 месяца назад
Okay, i see...the goal here is being quiet and stealthy!! Thank you
@theuni903
@theuni903 4 месяца назад
Hi Brian, thank you so much the content you are putting out. In terms of detection, would it not be more robust to look for the winpmem driver hash? As modifying it would invalidate the signature. Of course, assuming that we would have the detection capabilities and incentives
@CyberAttackDefense
@CyberAttackDefense 4 месяца назад
Look for both :)
@MikeClark7
@MikeClark7 4 месяца назад
Very cool. I always enjoy learning new things from your videos! They give me great ideas for different detections.
@CyberAttackDefense
@CyberAttackDefense 4 месяца назад
Cool, thanks
@danielabay01
@danielabay01 4 месяца назад
Awesome technique, learned something knew today, thanks!
@CyberAttackDefense
@CyberAttackDefense 4 месяца назад
Nice! Glad you learned something.
@crash9706
@crash9706 4 месяца назад
Great content. i learn a lot from you as a red teamer. My question is, how did you learn or know about this.
@CyberAttackDefense
@CyberAttackDefense 4 месяца назад
This one was brought on by a fleeting chat in a SANS chat room and experimentation. I am lucky to be around other smart people with great ideas that I can test and make into reality.
@cvport8155
@cvport8155 4 месяца назад
Wow bro make more ❤❤❤
@ohmsohmsohms
@ohmsohmsohms 4 месяца назад
Wow
Далее
18 Weird and Wonderful ways I use Docker
26:18
Просмотров 217 тыс.
🛑самое главное в жизни!
00:11
Просмотров 132 тыс.
NEVER install these programs on your PC... EVER!!!
19:26
Have You Picked the Wrong AI Agent Framework?
13:10
Просмотров 70 тыс.
Abusing IT Management Tools to Create C2
24:25
Просмотров 1,1 тыс.
this Cybersecurity Platform is FREE
39:46
Просмотров 574 тыс.
Build Your Own Drone Tracking Radar:  Part 1
20:08
Просмотров 542 тыс.
How does an OS boot? //Source Dive// 001
50:22
Просмотров 416 тыс.