technique
https://www.passcape.com/index.php?section=docsys&cmd=details&id=23
Passcape. (n.d.). Windows LSA secrets. Retrieved February 21, 2020.
technique
https://github.com/mattifestation/PowerSploit
PowerSploit. (n.d.). Retrieved December 4, 2014.
technique
https://www.first.org/resources/papers/conf2017/Windows-Credentials-Attacks-and-Mitigation-Technique
Chad Tilbury. (2017, August 8). 1Windows Credentials: Attack, Mitigation, Defense. Retrieved February 21, 2020.
technique
https://ired.team/offensive-security/credential-access-and-credential-dumping/dumping-lsa-secrets
Mantvydas Baranauskas. (2019, November 16). Dumping LSA Secrets. Retrieved February 21, 2020.
technique
https://attack.mitre.org/techniques/T1003/004
technique
http://msdn.microsoft.com/en-us/library/dd183341
Microsoft. (n.d.). AddMonitor function. Retrieved November 12, 2014.
technique
https://www.defcon.org/images/defcon-22/dc-22-presentations/Bloxham/DEFCON-22-Brady-Bloxham-Windows-
Bloxham, B. (n.d.). Getting Windows to Play with Itself [PowerPoint slides]. Retrieved November 12, 2014.
technique
https://technet.microsoft.com/en-us/sysinternals/bb963902
Russinovich, M. (2016, January 4). Autoruns for Windows v13.51. Retrieved June 6, 2016.
technique
https://attack.mitre.org/techniques/T1013
technique
https://community.cisco.com/t5/security-blogs/attackers-continue-to-target-legacy-devices/ba-p/41699
Omar Santos. (2020, October 19). Attackers Continue to Target Legacy Devices. Retrieved October 20, 2020.