This is an application to dump the contents of the LSA secrets on a machine. It uses the same technique as pwdump2 to bypass restrictions that Microsoft added to LsaRetrievePrivateData(), which cause the original lsadump, by Paul Ashton, to fail. You need the SeDebugPrivilege for it to work. By default, only Administrators have this right, so this program does not compromise NT security.
First, of course, back your system up, and try it on a test machine. Take both the lsadump2.exe and dumplsa.dll files and place them together in a directory on your NT box's local file system. Then, just run
[c:\lsadump2] lsadump2
and all of the LSA secrets will be written to the console. To capture the output in a file, run, e.g. "lsadump2 > secrets.txt"
[c:\lsadump2] lsadump2 43
Note that the LSA secrets are usually very sensitive information, which could possibly be used to compromise other machines, so be careful what you do with them.
MD5 (lsadump2.zip) = TBD
copyright © 2000 Todd Sabin