OS Credential Dumping: LSASS Memory

Description

Adversaries may attempt to access credential material stored in the process memory of the Local Security Authority Subsystem Service (LSASS).

Products, Sensors, and Dependencies

ProductDependenciesData sourceAccess requiredProtocolData CollectedNotes
Tenable Vulnerability ManagementAdvanced Network ScanWindows machinesAuthenticated ScanSMBCredential GuardPlugin ID: 159817
Tenable Vulnerability ManagementAdvanced Network ScanWindows machinesAuthenticated ScanSMBLSA ProtectionPlugin ID: 159929
Tenable Vulnerability ManagementAdvanced Network ScanWindows machinesAuthenticated ScanSMBInteractive loginsPlugin ID: 161502

References

Microsoft Windows Logged On Users

Windows LSA Protection Status

Windows Credential Guard Status

Attack Path Technique Details

Framework: MITRE ATT&CK

Family: Credential Access

Sub-Technique: LSASS Memory

Platform: Windows

Tenable Release Date: 2022 Q2