This podcast is sponsored by Arctic Wolf, whose Concierge Security teams Monitor, Detect and Respond to Cyber threats 24/7 for thousands of customers around the world. Arctic Wolf. Redefining cybersecurity. Visit to learn more.

In last week’s episode I was very close to potentially synching up some very sensitive data with my super secret back door account. In this episode, we resolve the cliffhanger and talk about:

python /opt/hashcombiner/ user_hash hash_password | sort > combined.txtcut -d ':' -f 2 combined.txt > passwords.txtruby /opt/pipal/pipal.rb passwords.txt > pip.txt
  • The procdump + lsass trick is still really effective (though sometimes AV gobbles it)

  • Wanna see if a user has a specific Chrome extension installed? Check this article and then use CrackMapExec with -x dir c:\x\y\z to verify its existence!

  • I jacked up my ankle and suffered an avulsion fracture. It’s good times.

There are a bunch of people I need to thank because their tools/encouragement/advice played a part in making the test successful:

Written by: Brian Johnson

Share on socials: