Skip to the content.

back

Find sigma rule :heavy_check_mark:

Attack: OS Credential Dumping

Adversaries may attempt to dump credentials to obtain account login and credential material, normally in the form of a hash or a clear text password. Credentials can be obtained from OS caches, memory, or structures.(Citation: Brining MimiKatz to Unix) Credentials can then be used to perform Lateral Movement and access restricted information.

Several of the tools mentioned in associated sub-techniques may be used by both adversaries and professional security testers. Additional custom tools likely exist as well.

MITRE

Tactic

technique

Test : Gsecdump

OS

Description:

Dump credentials from memory using Gsecdump.

Upon successful execution, you should see domain\username’s followed by two 32 character hashes.

If you see output that says “compat: error: failed to create child process”, execution was likely blocked by Anti-Virus. You will receive only error output if you do not run this test from an elevated context (run as administrator)

If you see a message saying “The system cannot find the path specified”, try using the get-prereq_commands to download and install Gsecdump first.

Executor

command_prompt

Sigma Rule

back