Windows Red Team Credential Access Techniques | Red Team Series 6-12
This guide is part of the HackerSploit Red Team series of guides. Credential Access consists of techniques for stealing credentials like account names and passwords. Techniques used to get credentials include: keylogging or credential dumping. Using legitimate credentials can give adversaries access to systems, make them harder to detect, and provide the opportunity to create more accounts to help achieve their goals.
0:30 What We’ll Be Covering
0:56 What is Credential Access?
1:57 Mitre Attack Techniques – Credential Access
2:39 Let’s Get Started
2:54 What is mimikatz?
3:52 Using mimikatz with our High Integrity Agent
6:30 Are There Any Login Passwords in Memory?
7:55 Using lsadump
9:20 Using the meterprater
14:46 Preparing the mimikatz Binaries
16:40 Dumping the Login Passwords
19:12 Using hash dump
19:30 Loading mimikatz with load_kiwi
19:49 Using the lsa_dump_sam and lsa_dump_secrets Command
21:07 Results from the Powershell Agent
21:57 Using the mimikatz-cache Module
22:24 Locating Our unattended.xml File
24:25 Uploading the Binary to the Target
26:64 Listing Login Sessions
28:54 Our Second Windows Target
29:21 Running mimikatz Modules using Starkiller
30:12 Listing Tokens We Can Impersonate
30:42 Uploading mimikatz
31:33 Using logonpasswords
32:46 Using lsadump::sam
33:15 Using sekursla::logonpasswords
34:14 Using the Windows Credentials Editor
36:46 Using hashdump
37:50 Using johntheripper
New to Linode? Get started here with a $100 credit!
Read the doc for more information on Credential Access.
Learn more about Hackersploit.
Subscribe to get notified of new episodes as they come out.
#Linode #Security #RedTeam #Hackersploit
Product: Linode, Security, Red Team; @HackerSploit ;
Windows Red Team Persistence Techniques | Red Team Series 5-12
You might also like…
Windows Privilege Escalation Techniques | Red Team Series 8-13In the eighth video in our series on Red Team Techniques, we will talk about Privilege Escalation Techniques in Windows.
Intrusion Detection with Snort – Blue Team Series with HackersploitIn this second episode of our Blue Team series @HackerSploit introduces intrusion detection with Snort, a powerful intrusion detection app.
Windows Defense Evasion Techniques | Red Team Series 7-12In the seventh video in our series on Red Team Techniques we will explore Defense Evasion in Windows.
Splunk Security Event Monitoring – Blue Team Series with HackersploitSplunk is the first data-to-everything platform powered by artificial intelligence, advanced data search, and optimized data streaming.