<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Password on CrimsonLabs</title><link>https://crimsonlabs.io/tags/password/</link><description>Recent content in Password on CrimsonLabs</description><generator>Hugo -- gohugo.io</generator><language>en</language><copyright>&lt;a href="https://crimsonlabs.io/attack-simulation/" target="_blank" rel="noopener">Attack Simulation&lt;/a></copyright><lastBuildDate>Sun, 23 Aug 2020 16:36:25 +0000</lastBuildDate><atom:link href="https://crimsonlabs.io/tags/password/index.xml" rel="self" type="application/rss+xml"/><item><title>Pass the Hash</title><link>https://crimsonlabs.io/posts/pass-the-hash/</link><pubDate>Sun, 23 Aug 2020 16:36:25 +0000</pubDate><guid>https://crimsonlabs.io/posts/pass-the-hash/</guid><description>Consider this:
Threat actor compromises your website running on IIS Successfully elevated privileges to SYSTEM Domain user with admin privileges logged-in in the past and thus has their password hash saved in the local machine. Actor dumped SAM and LSA hashes, revealing usernames &amp;amp; password hashes (sometimes clear-text) Usernames are checked against the domain for privileges, e.g. net user SomeUser /domain After verifying the user is Domain Admin, actor can move laterally and authenticate to the Domain Controller machine without knowing the actual admin password It’s a very straight to the point scenario and sometimes the attack route isn’t so direct.</description></item><item><title>Dumping Hashes</title><link>https://crimsonlabs.io/posts/dumping-hashes/</link><pubDate>Thu, 18 Jun 2020 06:08:00 +0000</pubDate><guid>https://crimsonlabs.io/posts/dumping-hashes/</guid><description>After getting admin access, one of the first thing you should try is to extract password hashes. Having these at hand is pivotal in moving laterally in the network.
Sysinternals’ procdump can be used to do a memory dump of the lsass.exe process. Be careful though, this has been known to trip Windows Defender. If you have fast enough fingers, you can copy the dump file before it gets deleted by defender.</description></item></channel></rss>