Our Blog
2024 (10)
2023 (19)
2022 (10)
2021 (13)
2020 (30)
2019 (10)
2018 (14)
2017 (27)
2016 (22)
2015 (17)
2014 (15)
2013 (30)
2012 (27)
2011 (33)
2010 (36)
2009 (81)
2008 (75)
2007 (80)
Categories
Categories
2024 (1)
Art (1)
Edr (3)
Lsa (1)
Registry (1)
Windows (16)
Research (76)
Sqli (1)
Lfi (1)
Industrial (1)
Network (2)
Cve (6)
Network protocol (1)
Active directory (8)
Guest (1)
Null sessions (1)
Exploit (15)
Vulnerability (4)
Webapps (18)
Cve-2024-26331 (1)
Cve-2024-28269 (1)
Web application (2)
Phishing (1)
Tool (7)
Typosquatting (1)
Ctf (5)
Training (64)
Hardware (11)
Mitm (6)
Programming (21)
Techniques (1)
Callbacks (1)
Driver (1)
Hooking (3)
Kernel (2)
Rootkit (1)
Shellcodes (1)
Ssdt (1)
Winapi (1)
Rootkits (1)
Shellcode (1)
0xcon (1)
2023 (1)
Contributions (1)
Keynote (2)
Talks (5)
Defence (2)
Bsides (3)
Cape town (1)
Law enforcement (1)
Strategy (1)
Talk (1)
Conferences (93)
Physical threats (2)
Redteam (8)
Code (2)
Experiment (3)
Perf (1)
Rust (2)
Performance (2)
Bypass (6)
Csp (1)
Reversing (18)
Av bypass (1)
Reverse engineering (3)
Blackhat (46)
Defcon (10)
Ringzer0 (1)
Browser (3)
Cache (1)
Smuggling (1)
Bug bountry (1)
Footprinting (3)
Steampipe (1)
Bugbounty (1)
Containers (1)
Docker (4)
Command injection (1)
Extensions (1)
Sensecon (5)
Teardown (1)
Hashcat (4)
Knowledge-base (1)
Tools (80)
Hash-cracking (1)
Kerberos (3)
Ntlm (2)
Delegation (1)
Protected users (1)
Bitlocker (1)
Clone (1)
Virtualisation (1)
Mallet (1)
Websockets (1)
Post-exploitation (6)
Socks (1)
Adcs (1)
Rubeus (3)
Certipy (1)
Authentication (2)
Internals (8)
Token (1)
Networking (5)
Offence (1)
Vpn (1)
Hackathon (4)
Sensecon 2022 (1)
Sensecon2022 (1)
Requestsmuggling (1)
Http2 (2)
Ibm (1)
Shell (2)
Cloud (13)
Corellium (1)
Mobile (20)
Pentest (7)
Ssh (1)
Usbfluxd (1)
Cracking (4)
Fun (61)
Sim card (1)
Android (7)
Objection (4)
Windows 11 (1)
Windows subsystem for android (1)
Wsa (1)
Wsl (1)
Challenge (5)
Sensecon 2021 (1)
Rpc (1)
Vegas (1)
Wifi (12)
Nmap (3)
Basic (1)
Infrastructure (6)
Http3 (1)
Quic (1)
Account takeover (1)
Javascript (2)
Xss (1)
Chain (1)
Ios (7)
Binary (1)
Attack (1)
Pwn (1)
Duo (1)
Games (2)
Sensecon 2020 (2)
Api (1)
Json (1)
Sensecon2020 (2)
Swagger (1)
Playstation (2)
Dual-pod-shock (1)
Dualsense (1)
Dualshock (1)
Sony (1)
Stutm (1)
Av evasion (3)
Automation (1)
Coding (1)
Forpoland (1)
Email (1)
Python (10)
Encodings (2)
Passwords (2)
0day (4)
Dll hijacking (1)
Privilege escalation (1)
Grafana (1)
Hipster (2)
Pi (1)
Pihole (1)
Traefik (1)
Acl (2)
Directaccess (1)
Kerberos resource-based constrained delegation (1)
Routopsy (1)
About:us (47)
Powershell (4)
Genericwrite (1)
Rcm (1)
Blue team (1)
Digital forensics (1)
Suricata (1)
Rce (2)
Source code review (1)
#4poland (1)
Amsi (1)
Chrome (2)
Exploit development (4)
Vulnerability research (2)
V8 (2)
Dos (1)
Monitor (1)
Poc (1)
Proofofconcept (1)
Prtg (1)
Prtg network monitor (2)
Shodan (1)
Usb (3)
Anti-virus (2)
Malware (3)
Persistence (1)
Sysmon (1)
Abuse (2)
Smartcards (1)
Windows events (1)
Forgery (1)
Impersonation (1)
Smartcard (1)
Bloodhound (1)
Dacls (1)
Mimikatz (1)
Powerview (1)
Browsers (1)
Exploitation (1)
Internal (2)
Radio (1)
Real-world (20)
Rf (2)
Shells (5)
Doom (1)
Frida (4)
Sensecon 2019 (1)
Variant analysis (1)
Code analysis (1)
Cve-2019-15937 (1)
Cve-2019-15938 (1)
Ql (1)
Semmle (1)
Metasploit (5)
Meterpreter (1)
Relay (1)
Rogue-ap (5)
Cve-2019-0547 (1)
Cve-2019-0726 (1)
Dhcp (1)
Kb4480966 (1)
Patch diffing (1)
Diffing (1)
Protocol (1)
Backdoor (3)
Lsass (1)
Password (1)
Deepdive (2)
Mac (16)
Cve-2018-19204 (1)
How-to (4)
Howto (23)
Webassembly (1)
Opsec (1)
Tin-foil-hat (8)
Command execution (1)
Dns (1)
Ioc (1)
Tunnelling (2)
Heap (7)
Heap linux (7)
Heap overflow (4)
Apngopt (2)
Exploitaion (4)
Bash (1)
Curl (1)
Efficiency (1)
Mq (1)
Detection (1)
Analysis (13)
Build-it (5)
Interception (1)
Tricks (6)
Sdr (3)
Gdb (1)
Apng (1)
Double free (2)
Linux (4)
Automated network scanner (2)
Go go go (1)
Screenshot (1)
Crypto (9)
Office (1)
Burp (1)
Certificates (2)
Skimmers (1)
Materials (5)
Pwnage friday (1)
Painless (1)
Ptmalloc2 (1)
Apache server (1)
Fuzzing (1)
Httpd (1)
Afl (1)
Cve-2017-7668 (1)
Printf (1)
Ook (1)
External (1)
Troopers (1)
Empire (3)
B-sides (5)
Presentations (9)
Dll injection (1)
Maltego (6)
Snoopy (3)
Defense (3)
Blackbox (1)
Ransomware (1)
Skype (3)
Transforms (1)
Zacon (1)
Willemluvscuddles (1)
Clickjacking (2)
Hipsterlurv (1)
Jack (1)
Ssl (1)
.za (3)
Jobs (5)
Product (4)
#legit (1)
Press release (4)
Interns (1)
Broadview (4)
Xml (1)
Malware analysis (1)
44con (6)
Show-off (1)
Z-force (1)
Z-wave (1)
Infosec-soapies (26)
Local (8)
Silly-yammerings (21)
Google (1)
Memory analysis (1)
Privacy (7)
Community (21)
Surveillance (1)
Solution (1)
Rsa (1)
Secureid (1)
Crest (1)
Sap (2)
Threat modelling (6)
Rambling (2)
Uk (2)
Zaprize (2)
Auditors (1)
Metrics (3)
Risk management (2)
Vendors (7)
Metricon (2)
Report-info (1)
Uncon (2)
Windows phone (1)
Auctions (1)
Penny (1)
Pickle (4)
Consulting (1)
Policy (1)
Ccdcoe (1)
Estonia (1)
.ac.za (1)
Vulnerability management (10)
Travel (2)
Suru (1)
Memcached (2)
Management (1)
Risk (1)
Proxy (1)
Hackrack (2)
Goodbye (1)
Fail (3)
Imsojaded (2)
Pci (2)
Videos (6)
Hope? (2)
Wasc (1)
Security-news (6)
Mindless-politics (4)
Security-fyi (8)
Qo[w|m|?] (4)
Time-waster (6)
Tech-toys (3)
Zen-hacking (3)
Foos (1)
Readme (1)
Web_x.0 (2)
Mindmaps (1)
Writing-advice (1)
Close
Dumping LSA secrets: a story about task decorrelation
Reading time: ~16 min
Posted by aurelien.chalot@orangecyberdefense.com on 03 July 2024
Categories:
Edr
,
Lsa
,
Registry
,
Windows
While doing an internal assessment, I was able to compromise multiple computers and servers but wasn’t able to dump the...