# CrowdStrike Falcon

{% file src="<https://91818421-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fnu6BRle7jstriyQEPfyd%2Fuploads%2FXqxal0kHKKQSloHFQRrX%2FCrowdStrike_Falcon_Bypass_Havoc.mp4?alt=media&token=6c433705-42d6-4040-8db0-dcddcef4cca8>" %}

* Dumping the LSASS memory and the SAM/SECURITY/SYSTEM registries as well.

### Establishing a reverse shell with a Metasploit C2 server.

{% file src="<https://91818421-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fnu6BRle7jstriyQEPfyd%2Fuploads%2FXe0FnrFdOG37viZ9BHqz%2FCrowdStrike_Falcon_Bypass_Metasploit.mp4?alt=media&token=2f846633-4f0a-4ea8-ad0c-329c0cdcc516>" %}
