Network vs Interactive Logons
This lab explores/compares when credentials are susceptible to credential dumping.
Last updated
This lab explores/compares when credentials are susceptible to credential dumping.
Last updated
Tested against Microsoft Windows 7 Professional 6.1.7601 Service Pack 1 Build 7601
Let's make a base password dump using mimikatz on the victim system to see what we can get before we start logging on to it using other methods such as runas, psexec, etc. To test this, the victim system was rebooted and no other attempts to login to the system were made except for the interactive logon to get access to the console:
Credentials were cached and got dumped by mimikatz:
Credentials were cached and got dumped by mimikatz:
Credentials were cached and got dumped by mimikatz:
Note that event logs show the logon of type 9 for the user mantvydas
, although we requested to logon as the user low
:
Logon type 9 means that the any network connections originating from our new process will use the new credentials, which in our case are credentials of the user low
. These credentials, get cached:
Imagine an Incident Responder is connecting to a victim system using that machine's local account remotely to inspect it for a compromise using pth-winexe:
Mimikatz shows no credentials got stored in memory for the user back
.
Imagine an Incident Responder is connecting to a victim system using a privileged domain account remotely to inspect it for a compromise using pth-winexe, a simple SMB mount or WMI:
Mimikatz shows no credentials got stored in memory for offense\spotless
or offense\administrator
.
RDPing to the victim system:
Credentials were cached and got dumped by mimikatz:
Note that any remote logon with a graphical UI is logged as logon event type 10 and the credentials stay on the logged on system:
Mimikatz shows no credentials got stored in memory for offense\spot
Note how all the logon events are of type 3 - network logons and read on to the next section.
Credentials were cached and got dumped by mimikatz:
Looking at the event logs, a logon type 2 (interactive) is observed amongst the network logon 3, which explains why credentials were successfully dumped in the above test:
Network logons do not get cached in memory except for when using PsExec
with alternate credentials specified via the -u
switch.
Interactive and remote interactive logons do get cached and can get easily dumped with Mimikatz.