Ending Soon! Get an iPad Air with Smart Keyboard, Surface Go, or $300 Off thru Dec 11 with OnDemand or vLive Training!

Baltimore 2014

Baltimore, MD | Mon, Sep 22 - Sat, Sep 27, 2014
This event is over,
but there are more training opportunities.

Extracting User Credentials using Memory Forensics

  • Alissa Torres
  • Tuesday, September 23rd, 7:15pm - 8:15pm

Though Windows credential extraction and password cracking are often categorized as offensive skills, used by pentesters and sophisticated attackers, digital forensic examiners and incident responders can also put these techniques to use to further their investigations. Just by parsing a physical memory image of a Windows system, local and domain user account password hashes can be pulled from the registry hives and plaintext credentials can be extracted from the wdigest in the lsass process for logged-on users. For employee or criminal investigations, cracking a user's logon password can allow the examiner access to encrypted files or accounts due to frequent password re-use by users. Likewise, in intrusion cases, being able to dump credentials from a compromised system allows the IR team to assess what accesses the attacker was able to acquire, providing for better scoping of the intrusion. This webcast walks through several practical forensics use cases for Windows credential extraction from memory and includes excerpts from the SANS FOR526: Memory Forensics In-Depth class.

Bonus Sessions

The following bonus sessions are open to all paid attendees at no additional cost. There are many different types of events that fall into these categories:

  • SANS@Night: Evening presentations given after day courses have ended. This category includes Keynotes.
  • Special Events: SANS-hosted events and other non-technical recreational offerings. This category includes, but is not limited to, Receptions and Information Tables.
Monday, September 22
Session Speaker Time Type
General Session - Welcome to SANS Dr. Eric Cole Monday, September 22nd, 8:15am - 8:45am Special Events
SANS Technology Institute Open House Bill Lockhart, Executive Director, SANS Technology Institute Monday, September 22nd, 6:00pm - 7:00pm Special Events
APT: It is Time to Act Dr. Eric Cole Monday, September 22nd, 7:15pm - 9:15pm Keynote
Tuesday, September 23
Session Speaker Time Type
Extracting User Credentials using Memory Forensics Alissa Torres Tuesday, September 23rd, 7:15pm - 8:15pm SANS@Night
Debunking the Complex Password Myth Keith Palmgren Tuesday, September 23rd, 8:15pm - 9:15pm SANS@Night
Wednesday, September 24
Session Speaker Time Type
The 13 Absolute Truths of Security Keith Palmgren Wednesday, September 24th, 7:15pm - 8:15pm SANS@Night
DLP FAIL!!! Using Encoding, Steganography, and Covert Channels to Evade DLP and Other Critical Controls Kevin Fiscus Wednesday, September 24th, 8:15pm - 9:15pm SANS@Night
Thursday, September 25
Session Speaker Time Type
Continuous Ownage: Why you Need Continuous Monitoring Seth Misenar Thursday, September 25th, 7:15pm - 8:15pm SANS@Night
Friday, September 26
Session Speaker Time Type
From APT to AVT - Investigating the Latest Threats Jess Garcia Friday, September 26th, 7:15pm - 8:15pm SANS@Night