-
#lsassy 1.1.6 is out
New -m flag to chose dumping method
Random dump names
CME module supports comsvcs.dll method
Better error handling
Handles user interrupt
Minor fixes and code cleaning
If you find corner cases, please share them !
https://github.com/Hackndo/lsassy Prikaži ovu nit -
Great blue team point of view of
#lsassy from Lee Kirkpatrick (@RSASupportDesk). Glad#lsassy can help defensive teams to improve their detection rules ! https://community.rsa.com/community/products/netwitness/blog/2020/01/06/using-rsa-netwitness-to-detect-credential-harvesting-lsassy …pic.twitter.com/vsOA39AIpu
-
#lsassy v2 is out
Dump credentials on multiple hosts
New dumping method using #dumpert (@OutflankNL) thanks to@Blurbdust
Can be used as a #library in other python project
Fully documented wiki !
Needs some testing, open issues if need be
https://github.com/Hackndo/lsassy -
Lsassy - Extract Credentials From Lsass Remotely http://j.mp/2G7JkCm
#BloodHound#CrackMapExec#Impacket#Lsass#Lsassy#Minidump#SMBpic.twitter.com/UShur3MiHq
-
RSA's Lee Kirkpatrick continues his
#ProfilingAttackers series on#RSALink with a new blog post on using the RSA#NetWitness Platform to detect credential harvesting performed by the new#lsassy tool developed by@HackAndDo. https://rsa.im/2Thf3J2#SIEM#DFIR#ThreatDetectionpic.twitter.com/k1m69bUPT3
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.