Overview
Syllabus
Introduction
What We’ll Be Covering
What is Credential Access?
Mitre Attack Techniques - Credential Access
Let’s Get Started
What is mimikatz?
Using mimikatz with our High Integrity Agent
Are There Any Login Passwords in Memory?
Using lsadump
Using the meterprater
Preparing the mimikatz Binaries
Dumping the Login Passwords
Using hash dump
Loading mimikatz with load_kiwi
Using the lsa_dump_sam and lsa_dump_secrets Command
Results from the Powershell Agent
Using the mimikatz-cache Module
Locating Our unattended.xml File
Uploading the Binary to the Target
Listing Login Sessions
Our Second Windows Target
Running mimikatz Modules using Starkiller
Listing Tokens We Can Impersonate
Uploading mimikatz
Using logonpasswords
Using lsadump::sam
Using sekursla::logonpasswords
Using the Windows Credentials Editor
Using hashdump
Using johntheripper
Conclusion
Taught by
Linode