Nexioton
Last updated
Last updated
Do you know why attacker values this file highly?
FILE: Isass.zip
This challenge required us to use mimikatz to dump credentials from LSASS process. LSASS stores sensitive information such as passwords and security tokens in memory while it's running. We can use a command to parse the memory structures used by LSASS to store credentials and displays them in a readable format.
Flag: LNC24{death_is_like_the_wind}