Do you know any other ways using one can extract credentials from Windows' LSASS?
I am aware of:
- Load and use mimikatz on a compromised machine
- Use a c# implementation of mimikatz (to evade A/V)
- Task Manager, right click on the lsass.exe process and "Create **** file". Then use mimikatz on your own machine against the created **** file
- Use other tools to **** lsass process memory and again use mimikatz in your own machine