Раз
www.deepinstinct.com
Два
www.deepinstinct.com
LSASS Memory Dumps: Dumping Methods Explained [Part 1] | Deep Instinct
LSASS memory dump files aid attackers to swiftly extract credentials. Read an in-depth analysis of LSASS dumps as an attack vector & dumping methods.
Два
LSASS Memory Dumps: New Method for Dumping LSASS [Part 2] | Deep Instinct
In this article, we show a new way to dump LSASS memory without dropping any new tool on the endpoint that is highly evasive.