Windows Password Techniques
Overview
Registry Hives
Key Registry Locations
Registry Hive
Location
Description
Backing Up Registry Hives
# Run as Administrator
reg.exe save hklm\sam C:\sam.save
reg.exe save hklm\system C:\system.save
reg.exe save hklm\security C:\security.saveFile Transfer Methods
Using Impacket SMB Server
Other Transfer Methods
Hash Extraction
Using Impacket secretsdump
Alternative Tools
Remote Hash Dumping
Using NetExec (formerly CrackMapExec)
Using Impacket remotely
Hash Types and Formats
NT Hash (NTLM)
LM Hash (Legacy)
DCC2 (Domain Cached Credentials)
Cracking Windows Hashes
NT Hash Cracking
DCC2 Hash Cracking
Batch Hash Cracking
DPAPI (Data Protection API)
What DPAPI Protects
DPAPI Keys from secretsdump
Decrypting DPAPI Blobs
LSA Secrets
What LSA Secrets Contain
Extracting LSA Secrets
LSASS Attacks
Overview
LSASS Memory Dumping Methods
1. Task Manager Method (GUI Required)
2. Rundll32.exe & Comsvcs.dll Method
3. Using Procdump
4. Using PowerShell
Extracting Credentials from LSASS Dumps
Using Pypykatz (Linux)
Using Mimikatz (Windows)
Credential Types in LSASS
MSV (Microsoft Authentication Package)
WDIGEST (Legacy Authentication)
Kerberos (Active Directory)
DPAPI (Data Protection API)
Live Memory Extraction
Using Mimikatz (Direct)
Using PowerShell Empire
Remote LSASS Attacks
Using NetExec
Using Impacket
Cracking Extracted Credentials
NT Hashes from LSASS
Defense Evasion for LSASS
Avoiding Detection
Cleanup
Common Issues and Solutions
Access Denied
Antivirus Detection
Large Dump Files
Practical LSASS Attack Workflow
Complete Example: Task Manager Method
Command-line Method Workflow
1. Enumerate Running Processes
2. Create Memory Dump
3. Transfer Dump File
4. Extract Credentials
5. Crack or Use Hashes
Advanced Techniques
Pass-the-Hash
Memory Dumping (Legacy)
Practical Workflow
1. Gain Administrative Access
2. Extract Registry Hives
3. Transfer Files
4. Extract Hashes
5. Crack Hashes
Defense Evasion
Avoiding Detection
Cleanup
Common Issues and Solutions
Access Denied
Large Hash Files
Slow Cracking
Hash Identification
Windows Credential Manager Attacks
Overview
Credential Types
Type
Description
Enumerating Stored Credentials
Using Stored Credentials
Extracting Credentials with Mimikatz
Alternative Tools
LaZagne - Multi-Platform Password Recovery
Overview
Key Features
Installation
Basic Usage
Supported Software Categories
Browsers
Email Clients
Chat Applications
Databases
FTP Clients
System Credentials
HTB Academy Scenario Walkthrough
Scenario Setup
Step 1: Initial Enumeration
Step 2: Privilege Escalation
Step 3: LaZagne Deployment
Step 4: Credential Extraction
LaZagne Modules
Common Modules
Module-Specific Examples
Output Formats
Console Output
JSON Output
Advanced Usage
Silent Mode with Output
Specific Categories
Remote Deployment
Detection and Evasion
Common Detections
Evasion Techniques
Defense Against LaZagne
Preventive Measures
Detection Methods
LaZagne vs Other Tools
Tool
Platform
Coverage
Stealth
Ease of Use
Manual Credential Hunting
Manual Credential Export
Common Credential Targets
Credential Manager Attack Workflow
Defense Considerations
Tools Summary
Extraction Tools
Cracking Tools
Transfer Tools
Kerbrute - Kerberos Pre-Authentication Attack Tool
Overview
Key Features
Installation
Pre-compiled Binaries
Compile from Source (ARM64/M1 Mac)
Docker Alternative (x86_64 emulation)
Basic Usage
Username Enumeration (Safest)
Password Spraying (Careful - Can Lock Accounts!)
Brute Force Single User (High Risk!)
Brute Force Credential Combos
Advanced Usage
Thread Control
Hash Capture (AS-REP Roasting)
Force Downgraded Encryption
Creating Username Lists
Common Username Conventions
Automated Username Generation
Attack Workflows
HTB Academy Scenario
PJPT Exam Strategy
Event Log Analysis
Windows Event IDs Generated
Defense and Detection
Detection Methods
Mitigation Strategies
Alternative Tools
If Kerbrute Doesn't Work
Troubleshooting
Common Issues and Solutions
Integration with Other Tools
Complete Attack Chain
Last updated