In-memory secrets

Theory

Just like the LSASS process on Windows systems allowing for LSASS dumping, some programs sometimes handle credentials in the memory allocated to their processes, sometimes allowing attackers to dump them.

Practice

πŸ’‘ Tip
Just like [LSASS dumping](/page/hacker-recipes/ad/movement/credentials/dumping/lsass), this technique needs the attacker to have admin access on the target machine since it involves dumping and handling volatile memory.

::: tabs

=== UNIX-like
On UNIX-like systems, tools like mimipenguin (C, Shell, Python), mimipy (Python) and LaZagne (Python) can be used to extract passwords from memory.

mimipenguin
laZagne memory

=== Windows

On Windows systems, tools like LaZagne (Python) and mimikatz (C) can be used to extract passwords from memory but they focus on LSASS dumping.

:::