Mimikatz
Mimikatz
Mimikatz can be used to dump credentials, tickets, and many more interesting attacks.Invoke-Mimikatz, is a PowerShell port of Mimikatz. Using the code from ReflectivePEInjection, mimikatz is loaded reflectively into the memory. All the functions of mimikatz could be used from this script.The script needs administrative privileges for dumping credentials from local machine. Many attacks need specific privileges which are covered while discussing that attack.
Lateral Movement - Extracting credentials from LSASS
Dump credentials on a local machine
Using SafetyKatz(Minidumpof lsassand PELoaderto run Mimikatz)
Dump credentials Using SharpKatz(C# port of some of Mimikatz functionality)
Dump credentials using Dumpert(Direct System Calls and API unhooking)
Using pypykatz(Mimikatz functionality in Python)
Using comsvcs.dll
Over Pass The Hash Lateral Movement is in Lateral Movement section.
Last updated