Part 3 - Credential Dumping & Threat Detection
Simulating adversary tactics in a SOC lab by using Sliver C2 to dump LSASS credentials, analyzing telemetry in LimaCharlie, and creating detection rules to identify credential theft attempts.
Now We'll Get Adversarial
Setting Up the Attack
Access Sliver C2
Check Privileges
getprivs
Dump LSASS Process (Credential Theft)
Why?
How?
Run the following command to dump LSASS:

Detecting the Attack
Analyze Telemetry in LimaCharlie
Create a Detection & Response (D&R) Rule
Test the Detection Rule
Validating the Detection
Re-run the Attack
Check for Detections
Last updated







