Featured resource
2026 Tech Forecast
2026 Tech Forecast

Stay ahead of what’s next in tech with predictions from 1,500+ business leaders, insiders, and Pluralsight Authors.

Get these insights
  • Course

Credential Access with LaZagne

In this course, you will learn privilege escalation using LaZagne, a post-exploitation tool used to recover credentials from a system.

Intermediate
21m
(8)

Created by Gavin Johnson-Lynn

Last Updated Feb 26, 2021

Course Thumbnail
  • Course

Credential Access with LaZagne

In this course, you will learn privilege escalation using LaZagne, a post-exploitation tool used to recover credentials from a system.

Intermediate
21m
(8)

Created by Gavin Johnson-Lynn

Last Updated Feb 26, 2021

Get started today

Access this course and other top-rated tech content with one of our business plans.

Try this course for free

Access this course and other top-rated tech content with one of our individual plans.

This course is included in the libraries shown below:

  • Security
What you'll learn

After initial access to a system, the next goal is typically to elevate privileges and exploit further systems. LaZagne retrieves credentials from a wide variety of operating system and software sources that help to do just that. In this course, Credential Access with LaZagne, you’ll learn how to utilize LaZagne to escalate privileges in a red team environment. First, you’ll explore getting credentials stored in browsers, one of the key features of LaZagne. Next, you’ll see how to get credentials from some of the many other programs that store them on a system. Finally, you’ll learn how to get LaZagne to extract as many credentials as it can find from a system, along with how to store them in a file for easy automation. When you’re finished with this course, you’ll have the skills and knowledge to execute these techniques: Credentials from Password Stores: Credentials from Web Browsers (T1555.003) and Unsecured Credentials: Credentials In Files (T1552.001) using LaZagne. Knowing how these techniques can be used against you will ultimately lend to your ability as an organization, or an individual, to detect and defend against specific attack vectors.

Credential Access with LaZagne
Intermediate
21m
(8)
Table of contents

About the author
Gavin Johnson-Lynn - Pluralsight course - Credential Access with LaZagne
Gavin Johnson-Lynn
17 courses 4.5 author rating 358 ratings

Gavin is passionate about security and has an extensive background in software development in regulated environments. He currently works in a Red Team at a FTSE 100 company.

Get started with Pluralsight