Nexioton

~# cat Question

Do you know why attacker values this file highly?

FILE: Isass.zip

This challenge required us to use mimikatz to dump credentials from LSASS process. LSASS stores sensitive information such as passwords and security tokens in memory while it's running. We can use a command to parse the memory structures used by LSASS to store credentials and displays them in a readable format.

sekurlsa::minidump lsass.DMP
sekurlsa::logonpasswords

Flag: LNC24{death_is_like_the_wind}

Last updated