Windows Red Team Credential Access Techniques | Red Team Series 6-12
This guide is part of the HackerSploit Red Team series of guides. Credential Access consists of techniques for stealing credentials like account names and passwords. Techniques used to get credentials include: keylogging or credential dumping. Using legitimate credentials can give adversaries access to systems, make them harder to detect, and provide the opportunity to create more accounts to help achieve their goals.
Chapters:
0:00 Introduction
0:30 What We’ll Be Covering
0:56 What is Credential Access?
1:57 Mitre Attack Techniques – Credential Access
2:39 Let’s Get Started
2:54 What is mimikatz?
3:52 Using mimikatz with our High Integrity Agent
6:30 Are There Any Login Passwords in Memory?
7:55 Using lsadump
9:20 Using the meterprater
14:46 Preparing the mimikatz Binaries
16:40 Dumping the Login Passwords
19:12 Using hash dump
19:30 Loading mimikatz with load_kiwi
19:49 Using the lsa_dump_sam and lsa_dump_secrets Command
21:07 Results from the Powershell Agent
21:57 Using the mimikatz-cache Module
22:24 Locating Our unattended.xml File
24:25 Uploading the Binary to the Target
26:64 Listing Login Sessions
28:54 Our Second Windows Target
29:21 Running mimikatz Modules using Starkiller
30:12 Listing Tokens We Can Impersonate
30:42 Uploading mimikatz
31:33 Using logonpasswords
32:46 Using lsadump::sam
33:15 Using sekursla::logonpasswords
34:14 Using the Windows Credentials Editor
36:46 Using hashdump
37:50 Using johntheripper
39:50 Conclusion
New to Linode? Get started here with a $100 credit!
Read the doc for more information on Credential Access.
Learn more about Hackersploit.
Subscribe to get notified of new episodes as they come out.
#Linode #Security #RedTeam #Hackersploit
Product: Linode, Security, Red Team; @HackerSploit ;