Renรฉ's URL Explorer Experiment


Title: Shellcode to Dump the Lsass Process | ๐Ÿ”Blog of Osanda

Open Graph Title: Shellcode to Dump the Lsass Process | ๐Ÿ”Blog of Osanda

Description: Here's the shellcode I wrote for curiosity and ended up working nicely :) This shellcode is for Windows 10 and Server 2019 x86_64. [crayon-6998030c269e5602024714/] This shellcode is for Windows 7, 8 x86_64 and anything below. I have only tested on Windows 7 and 8 x86_64. [crayon-6998030c269f7643155574/] [tweet https://twitter.com/Sektor7Net/status/1127852077445726208]

Open Graph Description: Hereโ€™s the shellcode I wrote for curiosity and ended up working nicely :) This shellcode is for Windows 10 and Server 2019 x86_64. [crayon-6998030c269e5602024714/]

Mail addresses

Opengraph URL: https://osandamalith.com/2019/05/11/shellcode-to-dump-the-lsass-process/

X: @osandamalith

Generator: Site Kit by Google 1.172.0

direct link

Domain: osandamalith.com

google-site-verificationfjCEM6xU63uTq43gsl33mim8a53rbmpqFpyt7S5xU38
msvalidate.01DC6EBAA1CF5D788CC97EC12281C943D6
google-adsense-platform-accountca-host-pub-2644536267352236
google-adsense-platform-domainsitekit.withgoogle.com
og:typearticle
article:published_time2019-05-11T13:36:48+00:00
article:modified_time2020-03-04T01:11:20+00:00
og:site_name๐Ÿ”Blog of Osanda
og:imagehttps://i0.wp.com/osandamalith.com/wp-content/uploads/2018/02/cropped-wallhaven-377439.jpg?fit=512,512&ssl=1
og:image:width512
og:image:height512
og:localeen_US
twitter:text:titleShellcode to Dump the Lsass Process
twitter:imagehttps://i0.wp.com/osandamalith.com/wp-content/uploads/2018/02/cropped-wallhaven-377439.jpg?fit=240,240&ssl=1
twitter:cardsummary
msapplication-TileImagehttps://i0.wp.com/osandamalith.com/wp-content/uploads/2018/02/cropped-wallhaven-377439.jpg?fit=270,270&ssl=1

Links:

๐Ÿ”Blog of Osanda Security Researching and Reverse Engineering https://osandamalith.com/
https://osandamalith.com/2019/05/11/shellcode-to-dump-the-lsass-process/
Skip to contenthttps://osandamalith.com/2019/05/11/shellcode-to-dump-the-lsass-process/#content
๐Ÿ  Homehttps://osandamalith.com/
๐Ÿ”’ My Advisorieshttps://osandamalith.com/my-exploits/
๐Ÿ’Š Cool Postshttps://osandamalith.com/cool-posts/
๐Ÿ’‰ SQLihttps://osandamalith.com/tag/mysql/
๐Ÿ•ท Web App Securityhttps://osandamalith.com/category/web-application-security/
๐Ÿ›  Toolshttps://osandamalith.com/category/tools/
โ˜ข Exploitshttps://osandamalith.com/category/exploits/
๐Ÿ”ฌ Reverse Engineeringhttps://osandamalith.com/category/reversing-2/
๐Ÿงฌ Malware Analysishttps://osandamalith.com/category/malware/
โ˜  Shellcodeshttps://osandamalith.com/shellcodes/
โ˜ฃ Abouthttps://osandamalith.com/about/
Osanda Malith Jayathissahttps://osandamalith.com/author/osandamalith/
May 11, 2019https://osandamalith.com/2019/05/11/shellcode-to-dump-the-lsass-process/
1 Commenthttps://osandamalith.com/2019/05/11/shellcode-to-dump-the-lsass-process/#comments
Shellcode to Dump the Lsass Processhttps://osandamalith.com/2019/05/11/shellcode-to-dump-the-lsass-process/
Tweethttps://twitter.com/share
Share on WhatsApp (Opens in new window) WhatsApp https://osandamalith.com/2019/05/11/shellcode-to-dump-the-lsass-process/?share=jetpack-whatsapp
Share on Telegram (Opens in new window) Telegram https://osandamalith.com/2019/05/11/shellcode-to-dump-the-lsass-process/?share=telegram
Print (Opens in new window) Print https://osandamalith.com/2019/05/11/shellcode-to-dump-the-lsass-process/#print?share=print
Morehttps://osandamalith.com/2019/05/11/shellcode-to-dump-the-lsass-process/
Share on Reddit (Opens in new window) Reddit https://osandamalith.com/2019/05/11/shellcode-to-dump-the-lsass-process/?share=reddit
Share on Tumblrhttps://www.tumblr.com/share
https://www.pinterest.com/pin/create/button/?url=https%3A%2F%2Fosandamalith.com%2F2019%2F05%2F11%2Fshellcode-to-dump-the-lsass-process%2F&media=https%3A%2F%2Fi0.wp.com%2Fosandamalith.com%2Fwp-content%2Fuploads%2F2018%2F02%2Fcropped-wallhaven-377439.jpg%3Ffit%3D96%252C96%26ssl%3D1&description=Shellcode%20to%20Dump%20the%20Lsass%20Process
Pockethttps://getpocket.com/save
Pentestinghttps://osandamalith.com/category/pentesting/
Reversinghttps://osandamalith.com/category/reversing-2/
lsasshttps://osandamalith.com/tag/lsass/
mimikatzhttps://osandamalith.com/tag/mimikatz/
shellcodehttps://osandamalith.com/tag/shellcode/
โ† Determining Registry Keys of Group Policy Settingshttps://osandamalith.com/2019/05/08/determining-registry-keys-of-group-policy-settings/
Analyzing an AutoHotKey Malware โ†’https://osandamalith.com/2019/05/22/analyzing-an-autohotkey-malware/
Shellcode to Dump the Lsass Process โ€“ ?Blog of Osanda โ€“ The Library 6.0https://aeternusmalus.wordpress.com/2019/05/11/shellcode-to-dump-the-lsass-process-%f0%9f%94%90blog-of-osanda/
Cancel replyhttps://osandamalith.com/2019/05/11/shellcode-to-dump-the-lsass-process/#respond
https://www.buymeacoffee.com/osandamalith
Tweets by OsandaMalithhttps://twitter.com/OsandaMalith?ref_src=twsrc%5Etfw
0dayhttps://osandamalith.com/tag/0day/
AHKhttps://osandamalith.com/tag/ahk/
ARMhttps://osandamalith.com/tag/arm/
arrayshttps://osandamalith.com/tag/arrays/
assemblyhttps://osandamalith.com/tag/assembly/
AutoHotKeyhttps://osandamalith.com/tag/autohotkey/
borland Chttps://osandamalith.com/tag/borland-c/
Chttps://osandamalith.com/tag/c/
c/c++https://osandamalith.com/tag/c-c/
Certshttps://osandamalith.com/tag/certs/
crackmehttps://osandamalith.com/tag/crackme/
CSRFhttps://osandamalith.com/tag/csrf/
ctfhttps://osandamalith.com/tag/ctf/
DLL Hijackinghttps://osandamalith.com/tag/dll-hijacking/
DoShttps://osandamalith.com/tag/dos/
EEhttps://osandamalith.com/tag/ee/
EE 4GEEhttps://osandamalith.com/tag/ee-4gee/
EE 4GEE Minihttps://osandamalith.com/tag/ee-4gee-mini/
eLearnSecurityhttps://osandamalith.com/tag/elearnsecurity/
exploithttps://osandamalith.com/tag/exploit/
exploit developmenthttps://osandamalith.com/tag/exploit-development/
format stringhttps://osandamalith.com/tag/format-string/
game hackinghttps://osandamalith.com/tag/game-hacking/
HEVDhttps://osandamalith.com/tag/hevd/
kernelhttps://osandamalith.com/tag/kernel/
LFIhttps://osandamalith.com/tag/lfi/
mimikatzhttps://osandamalith.com/tag/mimikatz/
MS-DOShttps://osandamalith.com/tag/ms-dos/
MySQLhttps://osandamalith.com/tag/mysql/
PEhttps://osandamalith.com/tag/pe/
Pentestinghttps://osandamalith.com/tag/pentesting/
PHPhttps://osandamalith.com/tag/php/
POST XSShttps://osandamalith.com/tag/post-xss/
Programminghttps://osandamalith.com/tag/programming/
Reverse Engineeringhttps://osandamalith.com/tag/reverse-engineering/
reversinghttps://osandamalith.com/tag/reversing/
shellcodehttps://osandamalith.com/tag/shellcode/
SQLihttps://osandamalith.com/tag/sqli/
SQL injectionhttps://osandamalith.com/tag/sql-injection/
toolshttps://osandamalith.com/tag/tools/
Web Application Securityhttps://osandamalith.com/tag/web-application-security/
windowshttps://osandamalith.com/tag/windows/
WMIhttps://osandamalith.com/tag/wmi/
XSShttps://osandamalith.com/tag/xss/
ZTEhttps://osandamalith.com/tag/zte/
Homehttps://osandamalith.com/
โ˜  Shellcodeshttps://osandamalith.com/shellcodes/
โ˜ฃ Abouthttps://osandamalith.com/about/
๐Ÿ’Š Cool Postshttps://osandamalith.com/cool-posts/
๐Ÿ”’ My Advisorieshttps://osandamalith.com/my-exploits/

Viewport: width=device-width

Robots: max-image-preview:large


URLs of crawlers that visited me.