Dumping passwords with Mimikatz
Windows
Using MimiKatz to Obtain Credentials
Mimikatz Cheat Sheet
Privilege Escalation
Get system
Credential Dumping
Dump credentials
Dump hashes
Pass-the-Hash
Pass-the-Hash (NTLM)
Kerberos Ticket Attacks
List Kerberos tickets
Export Kerberos tickets
Golden Ticket
Create Golden Ticket
Silver Ticket
Create Silver Ticket
Skeleton Key
Inject Skeleton Key
Windows Credentials Editor (WCE)
Inject WCE
Pass-the-Ticket
Pass-the-Ticket (Kerberos)
Miscellaneous
Dump LSASS Memory
Exit Mimikatz
Enumerating Credential Directories
First, enumerate all directories inside C:\Users\<USERNAME>\AppData\Roaming\Microsoft\Credentials\
:
Decrypting Credentials with MimiKatz
Use MimiKatz to decrypt credentials from a specific file (e.g., 84F1CAEEBF466550F4967858F9353FB4
):
This command will provide a guidMasterKey
for future use.
Enumerating Protected Directories
Next, enumerate directories inside C:\Users\USERNAME\appdata\roaming\microsoft\protect\
:
Identify the SID associated with the directories, e.g., S-1-5-21-1199398058-4196589450-691661856-1107
.
Decrypting Master Key
Using MimiKatz, decrypt the master key associated with the guidMasterKey
within the identified SID directory:
Extract the key provided in the output.
Decrypting Credentials with Master Key
Finally, decrypt credentials using the obtained master key:
Replace XXXXXX
with the appropriate credential file and <key>
with the master key obtained earlier.