LSASS Credentials

The Local Security Authority Subsystem Service (LSASS) process manages various security-related functions in Windows, such as user authentication.

circle-info

LSASS (lsass.exe) is a process that implements many functions of the Local Security Authority (LSA).

When a domain user performs an interactive logon (physically or via RDP) to a computer, the user's credentials get cached in the LSASS Process in order to use Single Sign-On (SSO) when a network logonarrow-up-right is required to access services on the domain.

circle-info

Users authenticating remotely via NTLM or Kerberos authentication will not cache their credentials on the computer unless Kerberos delegation is enabled.

To access the LSASS Process memory to extract credentials, you must have a user account with SeDebugPrivilege on the target Windows computer. Most of the time, this means that you have access to an account with local administrator privileges on the computer.

circle-info

SeDebugPrivilege gives the ability to inspect and manipulate any process on the system, regardless of ownership or permissions.

There are many, many tools and research on ways an attacker can dump the LSASS process. Dumping LSASS is a much larger topic than what is mentioned here, especially once you look into protections against LSASS dumping and evading EDR.

Regardless, below are a few popular methods that may work on organizations that may not have executed any penetration tests.

Linux (Attacker)
secretsdump.py <domain/>[username]<:password><@computer> <options>

OPTIONS
-outputfile                 Base Output Filename
-hashes                     Authenticate Using LMHASH:NTHASH
-k                          Use Kerberos Auth From ccache File

Last updated