Skip to content

Latest commit

 

History

History
60 lines (38 loc) · 1.73 KB

README.md

File metadata and controls

60 lines (38 loc) · 1.73 KB

Invoke-PowerExtract

This tool is able to parse memory dumps of the LSASS process without any additional tools (e.g. Debuggers) or additional sideloading of mimikatz. It is a pure PowerShell implementation for parsing and extracting secrets (LSA / MSV and Kerberos) of the LSASS process.

Important: The script holds no functionality to create dump files - it will just read them.

Usage

So you just want to read a created dump file? The usage is quite simple:

 Invoke-PowerExtract -PathToDMP C:\temp\lsass.dmp

and for kerberos tickets

 Invoke-PowerExtract -PathToDMP C:\temp\lsass.dmp -GetMeTickets $true

Example Extraction with the option "format-list"

Currently supported Windows Versions (64bit only):

Clients:

  • Windows 11
  • Windows 10
  • Windows 8.1
  • Windows 8
  • Windows 7

Server:

  • Windows Server 2022
  • Windows Server 2019
  • Windows Server 2016
  • Windows Server 2012R2
  • Windows Server 2012
  • Windows Server 2008R2
  • Windows Server 2008

Future Plans

Short-term I plan to implement the correct parsing of Kerberos Tickets to a format which can be read by Rubeus etc. - Currently Kerberos tickets are parsed but not transformed to the correct format - this is completed (more complex than I thought) .

How did you do it?

I wrote a little article about it here - https://powerseb.github.io/posts/LSASS-parsing-without-a-cat/ Kerberos in the making (i need to recover from those hex strings)

References

Many thanks and a big shout out to the pypykatz project which was the inspiration and source for this project:

https://github.com/skelsec/pypykatz

Additionally AADInternals provided some inspiration for the kerberos ticket part:

https://github.com/Gerenios/AADInternals