Mimikatz
About
Mimikatz is an incredibly effective offensive security tool developed by gentilkiwi. It is a post-exploitation tool that dumps passwords from memory, as well as hashes, PINs and Kerberos tickets. Other useful attacks are pass-the-hash, pass-the-ticket or building Golden Kerberos tickets. This makes post-exploitation lateral movement within a network easy for attackers. Mimikatz is a very powerful tool when attacking,or defending Windows Systems, it can also play with certificates or private keys, vault and more.
Mimikatz can only dump credentials and password hashes if it is executed from the context of a privilege user, like local admin.
Links
βMimikatz github(source)β
Usage
Get debug rights (this or Local System rights is required for many Mimikatz commands).
privilege::debugsekurlsa
Lists all available provider credentials. This usually shows recently logged on user and computer credentials.
sekurlsa::logonpasswordssekurlsa::logonpasswords fullDump and export Kerberos tickets from memory
Pass the hash - PTH
kerberos
Dump and export Kerberos tickets from memory associated with active user sessions
Pass the ticket - PTT
Create a Golden Ticket
ekeys
Dump encryption keys from the system's memory
DPAPI
Extract and decrypt credentials protected by DPAPI (Data Protection API) from memory
Golden/Silver Tickets
TGT
Interact with and manipulate Kerberos tickets
Last updated