Mimikatz
Used to harvest credentials from a windows machine.
Has two additional components:
Mimidrv
: driver that interacts with windows kernelMimilib
: Bypass applocker, auth package/SSP etc.
Runs with:
Administrator
withPrivilege::debug
modeSYSTEM
privilege
Kerberos
ask
list
Lists or exports TGTs and STs from the current session
purge
purge all TGTs and STs from the current session.
tgt
Prints information about the TGT from current session
golden
Golden Tickets
Create golden tickets from krbtgt's NTLM hash or Kerberos keys.
silver
Create silver ticket from a service's NTLM hash or Kerberos keys.
SekurLSA
Dumps keys, password hashes, pin codes from protected memory of lsass.exe proccess. Rights required:
SYSTEM
Administrator with debug privilege (privilege::debug)
backupkeys
get backup master keys.
credman
Lists credential manager
dpapi
Lists cached master keys
ekeys
Lists kerberos encryption keys
LSAdump
sam
Dumps the sam database directory from memory or offline using the sam and system registry hives.
dcsync
Perform dc-sync on the domain controller to dump ntds credentails, keys etc.
Last updated