

ĪPT33 has used a variety of publicly available tools like LaZagne, Mimikatz, and ProcDump to dump credentials. ĪPT3 has used a tool to dump credentials by injecting itself into lsass.exe and triggering with the argument "dig." ĪPT32 used Mimikatz and customized versions of Windows Credential Dumper to harvest credentials. They have also dumped the LSASS process memory using the MiniDump function.
HIJACK MAC PASSWORD
ĪPT28 regularly deploys both publicly available (ex: Mimikatz) and custom password retrieval tools on victims. ĪPT1 has been known to use credential dumping using Mimikatz. ĭuring the 2016 Ukraine Electric Power Attack, Sandworm Team used Mimikatz to capture and use legitimate credentials. CredSSP: Provides SSO and Network Level Authentication for Remote Desktop Services.Kerberos: Preferred for mutual client-server domain authentication in Windows 2000 and later.Wdigest: The Digest Authentication protocol is designed for use with Hypertext Transfer Protocol (HTTP) and Simple Authentication Security Layer (SASL) exchanges.Msv: Interactive logons, batch logons, and service logons are done through the MSV authentication package.The following SSPs can be used to access credentials: An adversary may modify these Registry keys to add new SSPs, which will be loaded the next time the system boots, or when the AddSecurityPackage Windows API function is called. The SSP configuration is stored in two Registry keys: HKLM\SYSTEM\CurrentControlSet\Control\Lsa\Security Packages and HKLM\SYSTEM\CurrentControlSet\Control\Lsa\OSConfig\Security Packages. Once loaded into the LSA, SSP DLLs have access to encrypted and plaintext passwords that are stored in Windows, such as any logged-on user's Domain password or smart card PINs. Windows Security Support Provider (SSP) DLLs are loaded into LSASS process at system start.
HIJACK MAC FULL
