MITRE
- ID :
T1003.005 - Tactic :
Credential Access - Platforms:
Windows
Cached Domain Credentials
Cached domain credentials allows authentication to occur in the event a domain controller is unavailable. Adversaries may attempt to extract credentials from the cache.
Exploitation
Mimikatz
We can dump cache credential using mimikatz. To do that, we need to download or transfer mimikatz to our target system(windows), then execute it ./mimikatz.exe. After executing mimikatz, we will elevate our privilege to nt authority by executing token::elevate. With our privilege elevated, we can dump cache credential by executing lsadump::cache.

Mitigations
- Consider adding users to the “Protected Users” Active Directory security group. This can help limit the caching of users’ plaintext credentials.
- Consider limiting the number of cached credentials (HKLM\SOFTWARE\Microsoft\Windows NT\Current Version\Winlogon\cachedlogonscountvalue)
- Ensure that local administrator accounts have complex, unique passwords across all systems on the network.
- Do not put user or admin domain accounts in the local administrator groups across systems unless they are tightly controlled.