Mimikatz

Executable

Powershell

Invoke-Mimikatz

List active user sessions

Cache

SAM

SAM & LSA secretschevron-right

LSA

SAM & LSA secretschevron-right

Load lsass.dump (extract from procdump or task manager)

LSASS secretschevron-rightUser Privilegeschevron-right

Then Pass The Hash

Pass the Hash (PtH)chevron-right

Export Tickets

Pass the Ticket (PtT) - Windowschevron-right

If you pick a ticket with the service krbtgt, it corresponds to the TGT of that account.

Extract Kerberos Keys

Pass the Ticket (PtT) - Linuxchevron-right

Then Pass the Key or OverPass the Hash

Pass the Key or OverPass the Hash

Pass the Ticket (PtT) - Windowschevron-right

Pass the Ticket (PtT)

Pass the Ticket (PtT) - Windowschevron-right

We can use the Mimikatz module misc to launch a new command prompt window with the imported ticket using the misc::cmd command

Kerberost

Kerberoastchevron-right

If we do not specify the base64 /out:true command, Mimikatz will extract the tickets and write them to .kirbi files

DCSync

DCSyncchevron-right

Last updated