Mimikatz

Executable

Powershell

Invoke-Mimikatz

List active user sessions

Cache

SAM

SAM & LSA secrets

LSA

SAM & LSA secrets

Load lsass.dump (extract from procdump or task manager)

LSASS secretsUser Privileges

Then Pass The Hash

Pass the Hash (PtH)

Export Tickets

Pass the Ticket (PtT) - Windows

If you pick a ticket with the service krbtgt, it corresponds to the TGT of that account.

Extract Kerberos Keys

Pass the Ticket (PtT) - Linux

Then Pass the Key or OverPass the Hash

Pass the Key or OverPass the Hash

Pass the Ticket (PtT) - Windows

Pass the Ticket (PtT)

Pass the Ticket (PtT) - Windows

We can use the Mimikatz module misc to launch a new command prompt window with the imported ticket using the misc::cmd command

Kerberost

Kerberoast

If we do not specify the base64 /out:true command, Mimikatz will extract the tickets and write them to .kirbi files

DCSync

DCSync

Last updated