Security Notes
  • Whoami
  • Pentesting
    • WEP-Pen
      • Reconnaissance
      • Enumeration
      • OWSAP TOP 10
        • Injection
          • Cross Site Scripting
            • Cross Site Scripting
            • Exploitation
            • Protections
          • SQL Injection
            • SQL Injection Overview
          • NoSQL Injection
          • CRLF Injection
          • XML Injection
        • Broken Access Control
          • Path Traversal
          • Sensitive Cookie with Improper SameSite Attribute
          • Link Following
          • Incorrect Default Permissions
          • Information disclosure
          • CSRF
            • csrf checklist
          • 403 bypass
          • Exposure of WSDL File Containing Sensitive Information
          • bussiness logic checklist
          • 2FA bypass checklist
          • admin panal checklist
          • idor checklist
          • Authentication checklist
          • reset_password_checklist
          • ATO
        • Cryptographic Failures
          • Cryptographic Failure
          • Weak Encoding for Password
          • Improper Following of a Certificate's Chain of Trust
            • Understanding Digital Certificates : Self-Signed and CA-Signed Certificate **
            • Transport Layer Security (TLS) and SSL **
          • Clear Text Transmission Of Sensitive Data
            • SSLStripping **
        • Insecure Design
        • Security Misconfiguration
          • CORS Miscofigration
          • Mail Server Misconfiguration
        • Vulnerable and Outdated Components
          • Using Components with Known Vulnerabilities
        • Identification and Authentication Failures
          • JWT Hacking
          • SAML Authentication bypass
        • Software and Data Integrity Failures
          • mass assignment
          • PostMessage Vulnerabilities
            • PostMessage Vulnerabilities
            • Blocking main page to steal postmessage
            • Bypassing SOP with Iframes - part 1
            • Bypassing SOP with Iframes - part 2
            • Steal postmessage modifying iframe location
        • Security Logging and Monitoring Failures
        • Server-Side Request Forgery (SSRF)
          • SSRF
      • Checklists
        • aem misconfiguration
        • exif_geo
        • xss
        • Session Management
        • Authorization
        • cookie
        • Django
        • Symfony
        • json
        • bypass rate limit
        • Rce
        • Register Page
      • eWPTXv2 Preparation
        • Encoding & Filtering
        • Evasion Basics
        • Cross-site scripting (XSS)
        • XSS Filter Evasion
        • Cross-site request forgery (CSRF
        • HTML5
      • API-Pen
        • API Discovry
        • Reverse Engineering API Documentation
        • Excessive Data Exposure
        • Vulnerability Scanning
        • API Authentication Attacks
          • Classic Authentication Attacks
          • API Token Attacks
        • API Authorization Attacks
          • Broken Object Level Authorization (BOLA)
          • Broken Function Level Authorization
        • Improper Assets Management
        • Mass Assignment
        • SSRF
        • Injection Attacks in API
        • Evasive Maneuvers
        • GraphQL Vulnerabilities
    • NET-Pen
      • Active Directory Pentesting
        • Active Directory Components
        • Initial Attack Vectors
          • LLMNR Poisoning
          • SMB Relay Attacks
          • IPv6 Attacks ( IPv6 DNS Takeover )
          • Printer Hacking
          • Methodology
          • Some Other Attacks
            • Zerologon (CVE-2020-1472)
            • PrintNightmare (CVE-2021-1675)
        • Post-Compromise Attacks
          • Pass Attacks
          • Kerberoasting Attack
          • Token Impersonation Attack
          • LNK File Attack
          • GPP / cPassword Attacks
          • Mimikatz
          • Methodology
        • We've Compromised the Domain
          • Dumping the NTDS.dit
          • Golden Ticket Attacks
          • Methodology
        • Case Study
        • Password Attacks
      • Attack Vectors by Port
        • FTP 21
        • SSH 22
        • Telnet 23 - 2323
        • SMTP 25
        • DNS 53
        • Kerberos 88
        • POP 110-995
        • RPC 111
        • Ident 113
        • NNTP 119
        • NetBIOS 137-138
        • SMB / Samba 135-139, 445
        • MSRPC 135
        • SNMP 161
        • LDAP 389,636
        • Modbus 502
        • OpenSSL 1337
        • Ms-SQL 1433
        • Oracle Listener 1521 1522 1529
        • NFS 2049
        • MySql 3306
        • RDP 3389
        • ADB Android Debug Bridge 5555
        • WinRM 5985 5986
        • VNC 5800 5900
        • Redis 6379
        • Unreal IRC 6667
        • Tomcat 8080
        • MongoDB 27017
        • http 80
      • Network basics
      • Information Gathering
      • Privilege Escalation
        • Windows Privilege Escalation
        • Linux Privilege Escalation
    • write-ups
      • How i found a Privilege Escalation via Impersonation Features feature
      • How I was able to discover ATO Via IDOR vulnerability
      • Easy full Account Takeover via Facebook OAuth Misconfiguration
Powered by GitBook
On this page
  • Running Mimikatz
  • Outcomes of Credential Dumping with Mimikatz
  1. Pentesting
  2. NET-Pen
  3. Active Directory Pentesting
  4. Post-Compromise Attacks

Mimikatz

PreviousGPP / cPassword AttacksNextMethodology

Last updated 5 months ago

What is Mimikatz?

Mimikatz is a post-exploitation tool that can:

  • Dump credentials stored in memory.

  • Generate and manipulate Kerberos tickets.

  • Perform Just a few attacks: Credential Dumping, Pass-the-Hash, Over-Pass-the-Hash, Pass- the-Ticket, Silver Ticket, and Golden Ticket

Download Mimikatz:

  • Visit the official GitHub repository: .

  • Download the mimikatz_trunk.zip file.

  1. Extract the Files:

    • Unzip the file to create a directory named mimikatz_trunk.

  2. Navigate to the x64 Folder:

    • For 64-bit Windows systems, use the files inside the x64 folder.

This preparation ensures you have the necessary binaries to execute Mimikatz commands effectively.

Running Mimikatz

To begin credential dumping

  • Open a Command Prompt (cmd): Ensure you run it as an administrator to avoid permission issues.

  • Navigate to the Mimikatz directory: Use the cd command to move to the directory where Mimikatz is stored.

cd c:\Users\pparker\Downloads\mimikatz_trunk\x64
  • Run Mimikatz: Execute the Mimikatz binary using the command:

mimikatz.exe

This launches the interactive Mimikatz interface.

3. Elevating Privileges

Mimikatz requires debug privileges to access sensitive memory areas. To enable these privileges:

  • Run the privilege command:

privilege::debug

This command enables debug privileges, allowing Mimikatz to interact with system processes and extract credentials. If successful, it returns Privilege '20' OK.

4. Dumping Credentials

To retrieve credentials stored in memory, run the foolowaing command :

sekurlsa::logonpasswords
  • Username, domain, and plaintext password: Identifies the user whose credentials and plaintext password are being extracted.

  • Hash password: Also get the hashed version of the password used by the account.

  • NTLM hash: A hashed version of the password used for authentication.

5. Validating the Results

After running the above commands, carefully review the output for sensitive information. Mimikatz typically presents data in an easy-to-read format, highlighting the credentials associated with each logged-on user session.

6. Optional Commands for Enhanced Analysis

Mimikatz offers additional commands to refine the extraction process:

  • Exploring available commands:

sekurlsa::

This displays a list of available subcommands under the sekurlsa module, helping tailor your credential dumping process to specific needs.

Outcomes of Credential Dumping with Mimikatz

After running Mimikatz, you will have access to:

  1. Plaintext Passwords: Direct passwords stored in memory.

  2. NTLM Hashes: Used for Pass-the-Hash attacks.

  3. Kerberos Tickets: Useful for ticket-based attacks like Golden Ticket and Pass-the-Ticket.

These credentials can be used to:

  • Access other systems.

  • Bypass authentication mechanisms.

  • Perform lateral movement in a network.

Folder x64
Files Inside the x64 Folder
Interactive Mimikatz Interface
Dumping Credentials — Username, Domain, Password
Hash Password
NTLM Hash
Mimikatz Releases