<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>Reverse Engineering on averagept</title>
    <link>https://averagept.pages.dev/tags/reverse-engineering/</link>
    <description>Recent content in Reverse Engineering on averagept</description>
    <generator>Hugo -- 0.147.7</generator>
    <language>en-us</language>
    <lastBuildDate>Thu, 16 Apr 2026 10:09:53 +0100</lastBuildDate>
    <atom:link href="https://averagept.pages.dev/tags/reverse-engineering/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Inside LSASS - Ticket Extraction</title>
      <link>https://averagept.pages.dev/posts/insidelsass/</link>
      <pubDate>Thu, 16 Apr 2026 10:09:53 +0100</pubDate>
      <guid>https://averagept.pages.dev/posts/insidelsass/</guid>
      <description>&lt;p&gt;The main focus of this blog post will be explaining how Kerberos tickets are cached in LSASS, how they can be extracted and how they can be used to impersonate other users. Ticket extraction will be demonstrated both automatically using &lt;strong&gt;Mimikatz&lt;/strong&gt; and manually by inspecting a memory dump of &lt;em&gt;lsass.exe&lt;/em&gt;. A fix to Mimikatz source code will be applied to make it correctly parse tickets.&lt;/p&gt;
&lt;h1 id=&#34;1-introducing-lsass&#34;&gt;1. Introducing LSASS&lt;/h1&gt;
&lt;p&gt;The &lt;em&gt;Local Security Authority Subsystem Service&lt;/em&gt; (LSASS.exe) is a Windows process responsible for handling &lt;strong&gt;local security policies&lt;/strong&gt;, &lt;strong&gt;user authentication&lt;/strong&gt;, and &lt;strong&gt;stores credentials in memory&lt;/strong&gt;. Because of this, it becomes a valuable target for attackers that want to move laterally inside a network.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
