References

Type
Url
Description

technique

https://www.passcape.com/index.php?section=docsys&cmd=details&id=23

Passcape. (n.d.). Windows LSA secrets. Retrieved February 21, 2020.


technique

https://github.com/mattifestation/PowerSploit

PowerSploit. (n.d.). Retrieved December 4, 2014.


technique

https://www.first.org/resources/papers/conf2017/Windows-Credentials-Attacks-and-Mitigation-Technique

Chad Tilbury. (2017, August 8). 1Windows Credentials: Attack, Mitigation, Defense. Retrieved February 21, 2020.


technique

https://ired.team/offensive-security/credential-access-and-credential-dumping/dumping-lsa-secrets

Mantvydas Baranauskas. (2019, November 16). Dumping LSA Secrets. Retrieved February 21, 2020.


technique

https://attack.mitre.org/techniques/T1003/004


technique

http://msdn.microsoft.com/en-us/library/dd183341

Microsoft. (n.d.). AddMonitor function. Retrieved November 12, 2014.


technique

https://www.defcon.org/images/defcon-22/dc-22-presentations/Bloxham/DEFCON-22-Brady-Bloxham-Windows-

Bloxham, B. (n.d.). Getting Windows to Play with Itself [PowerPoint slides]. Retrieved November 12, 2014.


technique

https://technet.microsoft.com/en-us/sysinternals/bb963902

Russinovich, M. (2016, January 4). Autoruns for Windows v13.51. Retrieved June 6, 2016.


technique

https://attack.mitre.org/techniques/T1013


technique

https://community.cisco.com/t5/security-blogs/attackers-continue-to-target-legacy-devices/ba-p/41699

Omar Santos. (2020, October 19). Attackers Continue to Target Legacy Devices. Retrieved October 20, 2020.