Investigating LSASS and its Capabilities
What is LSASS? The Local Security Authority Subsystem Service (LSASS) running as lsass.exe on Windows is the guard at the gate of your system’s security. After you log in, LSASS holds your credential data in memory: things like Kerberos tickets, NTLM hashes, and sometimes even plaintext passwords . This makes it attractive for attackers looking to hijack sessions, move laterally, or escalate privileges. This covers the TTP of TA0008 (Lateral Movement), TA0006 (Credential Access), TA0010 (Exfiltration). Sometimes its difficult to map to MITRE ATT&CK framework accurately as it gives a brief description of what the general outlook and goal of the adversary is trying to do. The real attack nature depends on what is being and accessed and the eventual goal and nature of the attack. Why Attackers Target LSASS Reading LSASS memory is like opening a treasure chest full of credentials. Tools such as Mimikatz , Procdump , Taskmgr , or even native system libraries like...