Help Health Professionals Fight Against COVID-19 by donating to WHO at covid19responsefund.org. We will donate 100% of our ad revenues. If you cannot donate please share with your network. Thank you for Humanity
Using Procdump and Mimikatz to retrieve Windows Credentials
This page will help you to use procdump and mimikatz to retrieve windows credentials stored in memory (RAM)
Dump and extract credentials from memory
Procdump ?! Mimikatz ?!
Mimikatz is a well known tool that can extract Windows plaintexts passwords, hashes, PIN code and kerberos tickets from memory. Mimikatz can also perform pass-the-hash, pass-the-ticket or build Golden tickets.
Procdump, from Sysinternals, is a command-line utility whose primary purpose is monitoring an application and generating crash dumps.
Mimikatz is largely detected by AntiVirus software : VirusTotal reports 44 / 66.
You might do not want / cannot use it on the target.
As Procdump is a legitimate Microsoft tool, it's not detected by AntiVirus. The goal is to dump the lsass.exe process, which contains the credentials, and then give this dump to mimikatz.
You need Admin rights to use it. Dump the lsass process which contains credentials: