Куда я попал?
SECURITM это SGRC система, ? автоматизирующая процессы в службах информационной безопасности. SECURITM помогает построить и управлять ИСПДн, КИИ, ГИС, СМИБ/СУИБ, банковскими системами защиты.
А еще SECURITM это место для обмена опытом и наработками для служб безопасности.

LaZagne

LaZagne is a post-exploitation, open-source tool used to recover stored passwords on a system. It has modules for Windows, Linux, and OSX, but is mainly focused on Windows systems. LaZagne is publicly available on GitHub.(Citation: GitHub LaZagne Dec 2018)
ID: S0349
Type: TOOL
Platforms: Windows
Version: 1.3
Created: 30 Jan 2019
Last Modified: 15 Oct 2021

Techniques Used

Domain ID Name Use
Enterprise T1555 .001 Credentials from Password Stores: Keychain

LaZagne can obtain credentials from macOS Keychains.(Citation: GitHub LaZagne Dec 2018)

.003 Credentials from Password Stores: Credentials from Web Browsers

LaZagne can obtain credentials from web browsers such as Google Chrome, Internet Explorer, and Firefox.(Citation: GitHub LaZagne Dec 2018)

.004 Credentials from Password Stores: Windows Credential Manager

LaZagne can obtain credentials from Vault files.(Citation: GitHub LaZagne Dec 2018)

Enterprise T1003 .001 OS Credential Dumping: LSASS Memory

LaZagne can perform credential dumping from memory to obtain account and password information.(Citation: GitHub LaZagne Dec 2018)

.004 OS Credential Dumping: LSA Secrets

LaZagne can perform credential dumping from LSA secrets to obtain account and password information.(Citation: GitHub LaZagne Dec 2018)

.005 OS Credential Dumping: Cached Domain Credentials

LaZagne can perform credential dumping from MSCache to obtain account and password information.(Citation: GitHub LaZagne Dec 2018)

.007 OS Credential Dumping: Proc Filesystem

LaZagne can obtain credential information running Linux processes.(Citation: GitHub LaZagne Dec 2018)

.008 OS Credential Dumping: /etc/passwd and /etc/shadow

LaZagne can obtain credential information from /etc/shadow using the shadow.py module.(Citation: GitHub LaZagne Dec 2018)

Enterprise T1552 .001 Unsecured Credentials: Credentials In Files

LaZagne can obtain credentials from chats, databases, mail, and WiFi.(Citation: GitHub LaZagne Dec 2018)

Groups That Use This Software

ID Name References
G0077 Leafminer

(Citation: Symantec Leafminer July 2018)

G0022 APT3

(Citation: Symantec Buckeye)

G0049 OilRig

(Citation: FireEye APT35 2018)

G0069 MuddyWater

(Citation: Symantec MuddyWater Dec 2018) (Citation: TrendMicro POWERSTATS V3 June 2019)

G0100 Inception

(Citation: Kaspersky Cloud Atlas August 2019)

G0064 APT33

(Citation: Symantec Elfin Mar 2019)

G0139 TeamTNT

(Citation: ATT TeamTNT Chimaera September 2020)

G0131 Tonto Team

(Citation: TrendMicro Tonto Team October 2020)

G0120 Evilnum

(Citation: ESET EvilNum July 2020)

Мы используем cookie-файлы, чтобы получить статистику, которая помогает нам улучшить сервис для вас с целью персонализации сервисов и предложений. Вы может прочитать подробнее о cookie-файлах или изменить настройки браузера. Продолжая пользоваться сайтом, вы даёте согласие на использование ваших cookie-файлов и соглашаетесь с Политикой обработки персональных данных.