Mimikatz
Mimikatz
Author: https://github.com/gentilkiwi/mimikatz
Miscellaneous
privilege::debugtoken::elevate
token::revertsekurlsa::patch Credentials Dumping
vault::credvault::listdpapi::cred /in"%appdata%\Microsoft\Credentials\85HJK6B5J456KJ46KJ546435H3JK"
PREREQUISITES:
STEPS:
1: Vault Credentials Method
2: Elevating to SYSTEM
3: DPAPI Method
4: Extracting DPAPI Master Keys
5: Offline Method
Kerberos
Arguments:
Arguments:
Key Arguments:
Target and Service for Silver Ticket:
Target ticket:
Lifetime Arguments:
Arguments:
Lsadump
PREREQUISITES:
Requirements: SYSTEM privileges
Requirements: SYSTEM privileges and SAM hive files.
Sekurlsa
Requirements: Administrator privileges to acquire the debug priovilege via
OR SYSTEM access by any means.
TIP: Starting with Windows 8.x and 10, passwords are NOT stored in memory by default. However, there are exceptions such as when the DC is unreachable or specific registry settings are configured to store credentials.
Memory dump
Dumps details of authentication session and associated credentials.
Each of these formats contains memory snapshots that can be analyzed to extract sensitive information such as passwords, keys, PIN code and tickets.
Remote Execution
Remote execution with Mimikatz enables the execution of Mimikatz commands on remote systems to extract sensitive information such as passwords and credentials.
Crypto Module
Provides functionality similar to the certutil utility and includes capabilities for token impersonation, patching legacy CryptoAPI functions and modifying the CNG key isolation service.
TIP: Ensure you have the correct ACL on the filesystem to access private keys. Some operations might require elevated privileges (UAC prompts for example)
TIP 2: Smartcard crypto providers may sometimes falsely report successful private key exports.
Last updated