Cached Domain Credentials

ATT&CK ID: T1003.005

Permissions Required: SYSTEM


Adversaries may attempt to access cached domain credentials used to allow authentication to occur in the event a domain controller is unavailable.

On Windows Vista and newer, the hash format is DCC2 (Domain Cached Credentials version 2) hash, also known as MS-Cache v2 hash. The number of default cached credentials varies and can be altered per system. This hash does not allow pass-the-hash style attacks, and instead requires Password Cracking to recover the plaintext password.


Note: MS-Cache password hashes cannot be used in Pass-The-Hash (Pth) attacks. However, they can be cracked to reveal the clear-text password.


LaZagne.exe windows


use post/windows/gather/cachedump


Invoke-Mimikatz -Command '"lsadump::cache"'



The "Local Administrator Password Solution" (LAPS) provides management of local account passwords of domain joined computers. Passwords are stored in Active Directory (AD) and protected by ACL, so only eligible users can read it or request its reset.

Group Policy - Limited cached credentials

Policy Description

Each unique user's logon information is cached locally so that, in the event that a domain controller is unavailable during subsequent logon attempts, they are able to log on. The cached logon information is stored from the previous logon session.

Policy name

Interactive logon: Number of previous logons to cache (in case domain controller is not available)


Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options


5 (Recommended by CIS Controls)

Protected Users Group

This group was developed to provide better protection for high privileged accounts from credential theft attacks. Members of this group have non-configurable protection applied.

Last updated