sil3nt_n1nja · OSCP, OSCE · ■■■□□□□□□□
- Last Active
- Offensive Security Department Lead
- About Me
- Your everyday adversary...
I have been an offensive security fanboy from the beginning of my career. I recently persuaded my company to buy IHRP for me. I was really interested to witness first hand how the attacks i usually e… (View Post)
Do you know any other ways using one can extract credentials from Windows' LSASS? I am aware of: * Load and use mimikatz on a compromised machine * Use a c# implementation of mimikatz (to evade A/V) … (View Post)