Version 0.1.1 is out !
CME module is now integrated in the same repository https://github.com/Hackndo/lsassy/tree/master/cme …
CME module adds credentials to CME database
-
-
Prikaži ovu nit
-
Work in progress:
#bloodhound integration to highlight compromised users with path to domain adminpic.twitter.com/Vz9WMdjElSPrikaži ovu nit -
Prikaži ovu nit
Kraj razgovora
Novi razgovor -
-
-
Checkout comsvcs.dll if you want to make a dump without using procdump:https://modexp.wordpress.com/2019/08/30/minidumpwritedump-via-com-services-dll/ …
-
It's now live with lsassy 1.0.0
https://twitter.com/HackAndDo/status/1212843282696482818?s=20 …
- Još 1 odgovor
Novi razgovor -
-
-
Nice work ! Another avenue which I think is to retrieve password hashes from registry hive system security, Sam and then leverage secretsdump script from impacket this shouldn't be a large file like lsass dump
- Još 1 odgovor
Novi razgovor -
-
-
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

lsassy :
Detect paths to domain admin from compromised users
Set compromised hosts as owned
Beautified lsassy output
Comments, improvements and fixes are most welcome !