This tool is able to parse memory dumps of the LSASS process without any additional tools (e.g. Debuggers) or additional sideloading of mimikatz. It is a pure PowerShell implementation for parsing and extracting secrets (LSA / MSV and Kerberos) of the LSASS process.
Important: The script holds no functionality to create dump files - it will just read them.
So you just want to read a created dump file? The usage is quite simple:
Invoke-PowerExtract -PathToDMP C:\temp\lsass.dmp
and for kerberos tickets
Invoke-PowerExtract -PathToDMP C:\temp\lsass.dmp -GetMeTickets $true
Currently supported Windows Versions (64bit only):
Clients:
- Windows 11
- Windows 10
- Windows 8.1
- Windows 8
- Windows 7
Server:
- Windows Server 2022
- Windows Server 2019
- Windows Server 2016
- Windows Server 2012R2
- Windows Server 2012
- Windows Server 2008R2
- Windows Server 2008
Short-term I plan to implement the correct parsing of Kerberos Tickets to a format which can be read by Rubeus etc. - Currently Kerberos tickets are parsed but not transformed to the correct format - this is completed (more complex than I thought) .
I wrote a little article about it here - https://powerseb.github.io/posts/LSASS-parsing-without-a-cat/ Kerberos in the making (i need to recover from those hex strings)
Many thanks and a big shout out to the pypykatz project which was the inspiration and source for this project:
https://github.com/skelsec/pypykatz
Additionally AADInternals provided some inspiration for the kerberos ticket part: