Mimikatz

Mimikatz - Export Tickets

mimikatz.exe
privilege::debug
sekurlsa::tickets /export
exit
  • The tickets that end with $ correspond to the computer account, which needs a ticket to interact with the Active Directory.

  • User tickets have the user's name,

    • followed by an @ that separates the service name and the domain, for example: [randomvalue][email protected].

  • We can also export tickets using Rubeus and the option dump

    • This option can be used to dump all tickets (if running as a local administrator).

  • Rubeus dump, instead of giving us a file, will print the ticket encoded in base64 format. We are adding the option /nowrap for easier copy-paste.

Mimikatz - Extract Kerberos Keys

mimikatz.exe
privilege::debug
sekurlsa::ekeys

Mimikatz - Pass the Key or OverPass the Hash

Mimikatz - Pass the Ticket

Mimikatz - PowerShell Remoting with Pass the Ticket

Mimikatz - If you already have lsass.dmp

  • Note: It is always a good idea to type "log" before running any commands in "Mimikatz" this way all command output will put output to a ".txt" file.

    • This is especially useful when dumping credentials from a server which may have many sets of credentials in memory.

Last updated