# Credential Access & Dumping

* [Dumping Credentials from Lsass Process Memory with Mimikatz](https://hamcodes.gitbook.io/hackersnotes/offensive-security/credential-access-and-dumping/dumping-credentials-from-lsass-process-memory-with-mimikatz)
* [Dumping Lsass Without Mimikatz](https://hamcodes.gitbook.io/hackersnotes/offensive-security/credential-access-and-dumping/dumping-lsass-without-mimikatz)
* [Dumping Lsass without Mimikatz with MiniDumpWriteDump](https://hamcodes.gitbook.io/hackersnotes/offensive-security/credential-access-and-dumping/dumping-lsass-without-mimikatz-with-minidumpwritedump)
* [Dumping Hashes from SAM via Registry](https://hamcodes.gitbook.io/hackersnotes/offensive-security/credential-access-and-dumping/dumping-hashes-from-sam-via-registry)
* [Dumping SAM via esentutl.exe](https://hamcodes.gitbook.io/hackersnotes/offensive-security/credential-access-and-dumping/dumping-sam-via-esentutl.exe)
* [Dumping LSA Secrets](https://hamcodes.gitbook.io/hackersnotes/offensive-security/credential-access-and-dumping/dumping-lsa-secrets)
* [Dumping and Cracking mscash - Cached Domain Credentials](https://hamcodes.gitbook.io/hackersnotes/offensive-security/credential-access-and-dumping/dumping-and-cracking-mscash-cached-domain-credentials)
* [Dumping Domain Controller Hashes Locally and Remotely](https://hamcodes.gitbook.io/hackersnotes/offensive-security/credential-access-and-dumping/dumping-domain-controller-hashes-locally-and-remotely)
* [Dumping Domain Controller Hashes via wmic and Vssadmin Shadow Copy](https://hamcodes.gitbook.io/hackersnotes/offensive-security/credential-access-and-dumping/dumping-domain-controller-hashes-via-wmic-and-vssadmin-shadow-copy)
* [Network vs Interactive Logons](https://hamcodes.gitbook.io/hackersnotes/offensive-security/credential-access-and-dumping/network-vs-interactive-logons)
* [Reading DPAPI Encrypted Secrets with Mimikatz and C++](https://hamcodes.gitbook.io/hackersnotes/offensive-security/credential-access-and-dumping/reading-dpapi-encrypted-secrets-with-mimikatz-and-c++)
* [Credentials in Registry](https://hamcodes.gitbook.io/hackersnotes/offensive-security/credential-access-and-dumping/credentials-in-registry)
* [Password Filter](https://hamcodes.gitbook.io/hackersnotes/offensive-security/credential-access-and-dumping/password-filter)
* [Forcing WDigest to Store Credentials in Plaintext](https://hamcodes.gitbook.io/hackersnotes/offensive-security/credential-access-and-dumping/forcing-wdigest-to-store-credentials-in-plaintext)
* [Dumping Delegated Default Kerberos and NTLM Credentials w/o Touching Lsass](https://hamcodes.gitbook.io/hackersnotes/offensive-security/credential-access-and-dumping/dumping-delegated-default-kerberos-and-ntlm-credentials-w-o-touching-lsass)
* [Intercepting Logon Credentials via Custom Security Support Provider and Authentication Packages](https://hamcodes.gitbook.io/hackersnotes/offensive-security/credential-access-and-dumping/intercepting-logon-credentials-via-custom-security-support-provider-and-authentication-packages)
* [Pulling Web Application Passwords by Hooking HTML Input Fields](https://hamcodes.gitbook.io/hackersnotes/offensive-security/credential-access-and-dumping/pulling-web-application-passwords-by-hooking-html-input-fields)
* [Intercepting Logon Credentials by Hooking msv1\_0!SpAcceptCredentials](https://hamcodes.gitbook.io/hackersnotes/offensive-security/credential-access-and-dumping/intercepting-logon-credentials-by-hooking-msv1_0-spacceptcredentials)
* [Credentials Collection via CredUIPromptForCrede](https://hamcodes.gitbook.io/hackersnotes/offensive-security/credential-access-and-dumping/credentials-collection-via-creduipromptforcredentials)
