After initial access to a system, the next goal is typically to elevate privileges and exploit further systems. LaZagne retrieves credentials from a wide variety of operating system and software sources that help to do just that. In this course, Credential Access with LaZagne, you’ll learn how to utilize LaZagne to escalate privileges in a red team environment. First, you’ll explore getting credentials stored in browsers, one of the key features of LaZagne. Next, you’ll see how to get credentials from some of the many other programs that store them on a system. Finally, you’ll learn how to get LaZagne to extract as many credentials as it can find from a system, along with how to store them in a file for easy automation. When you’re finished with this course, you’ll have the skills and knowledge to execute these techniques: Credentials from Password Stores: Credentials from Web Browsers (T1555.003) and Unsecured Credentials: Credentials In Files (T1552.001) using LaZagne. Knowing how these techniques can be used against you will ultimately lend to your ability as an organization, or an individual, to detect and defend against specific attack vectors.
Course Overview Welcome to Pluralsight and this Red Team Tools course featuring LaZagne, the open‑source credential access tool developed and maintained by Alessandro Zanni. As a red team operator, getting credentials to help you move around an environment is often an important part of an engagement. Once you've gained access to a computer, manually finding all of the common locations that credentials are stored can be a time‑consuming task. While the occasional credential might require the thought and experience of a seasoned operator to find, they're often stored in a selection of common locations and take a little effort to extract. LaZagne allows you to gather credentials from a variety of sources, including operating systems, browsers, common system administration tools, email clients, and a whole lot more. If you'd like to learn how to quickly gather credentials from a wide variety of locations, then join me in learning how to access credentials with LaZagne, here at Pluralsight.