The tools to be used are Metasploit, Man Tech Memory DD, Volatility
- Use Metasplit to launch exploit
- Upload MDD using Meterpreter
- Execute MDD on the victim machine
- Download the memory image
- Use volatility tool to dump the hashs from the memory image
The link below has other external detailed links on volatility framework.
The problem will be downloading the memory dump with large size...