LSASS (Local Security Authority Subsystem Service) is where Windows keeps your secrets. Passwords, hashes, tickets - it's all in LSASS memory. Dumping LSASS is how Mimikatz extracts credentials. But Mimikatz is heavily detected - let's explore all the ways to get at that juicy memory.Related
Think of LSASS as the security guard who knows everyone's secret password. The guard needs to remember them to let people in, but if you can "read the guard's mind" (dump memory), you learn all the secrets.
Detection Focus
LSASS access is heavily monitored. EDR, AV, and Windows Defender all watch for it. Modern attacks focus on living-off-the-land binaries (LOLBins) and memory forensics evasion.
What's in LSASS?
Direct LSASS Access
Mimikatz (Classic)
pypykatz (Python)
LSASS Dump Methods
Task Manager (GUI)
ProcDump (Sysinternals)
comsvcs.dll (LOLBin)
MiniDumpWriteDump API
nanodump
SafetyKatz
Dump First, Parse Later
On heavily monitored systems, dump LSASS to a file, exfiltrate it, and parse offline. Running Mimikatz live is more detectable than just creating a dump file.
Parsing Dump Files
Shadow Copy Method
Remote LSASS Dumping
LSASS Protections
Bypassing LSA Protection
Detection & Evasion
LSASS Dumping Methodology
LSASS Attack Flow
1
Check ProtectionsLSA Protection? Credential Guard?
2
Choose MethodTask Manager → ProcDump → comsvcs.dll → nanodump
3
Create DumpExecute chosen dumping method
4
ExfiltrateCopy dump file to analysis machine
5
ParseUse Mimikatz or pypykatz to extract creds
6
CleanupRemove dump file, clear evidence
Knowledge Check
Challenges
Key Takeaways
- LSASS contains passwords, hashes, and Kerberos tickets
- Task Manager dump is surprisingly effective
- comsvcs.dll MiniDump is a LOLBin alternative
- Dump and parse offline to avoid detection
- LSA Protection makes dumping harder but not impossible
- Credential Guard virtualizes and truly protects credentials