LSASS and SAM
LSASS
LSASS is the king of post-exploitation targets in Windows environments. LSASS contains cached credentials for logon sessions, Kerberos tickets, and other secrets. This is the ideal target, but these days EDR vendors have it pretty locked down. Dumping smaller parts of the the LSASS process is less likely to get noticed, such as only grabbing Kerberos tickets.
The classic LSASS dump method is just to use mimikatz. There's countless other options and ports at this point, each made in different languages and for different reasons. Here are a few.
mimikatz sekurlsa::logonpasswords
nxc smb 10.10.10.10 -u admin -p pass --lsaSAM
The SAM contains NTLM hashes of local-only accounts. This is useful to grab the local Administrator NTLM hash, but that's probably about it.
mimikatz lsadump::sam
nxc smb 10.10.10.10 -u admin -p --samLast updated