LSA Secrets (T1003.004)

View on ATT&CK

In Playbook

Associated Tactics

  • Credential Access

Credential Access (TA0006)

The adversary is trying to steal account names and passwords. Credential Access consists of techniques for stealing credentials like account names and passwords. Techniques used to get credentials include keylogging or credential dumping. Using legitimate credentials can give adversaries access to systems, make them harder to detect, and provide the opportunity to create more accounts to help achieve their goals.

View on ATT&CK

Procedure Examples

Description Source(s)
Chad Tilbury. (2017, August 8). 1Windows Credentials: Attack, Mitigation, Defense. Retrieved February 21, 2020. Tilbury Windows Credentials
Mantvydas Baranauskas. (2019, November 16). Dumping LSA Secrets. Retrieved February 21, 2020. ired Dumping LSA Secrets
Microsoft. (2019, February 14). Active Directory administrative tier model. Retrieved February 21, 2020. Microsoft AD Admin Tier Model
Passcape. (n.d.). Windows LSA secrets. Retrieved February 21, 2020. Passcape LSA Secrets
PowerSploit. (n.d.). Retrieved December 4, 2014. Powersploit