Par : Liryc
Bonjour Je créé un minidump via le taskmanager et voici ce que j’obtiens aprés sur la même machine …. Merci de m’éclairer ;-) .#####. mimikatz 2.0 alpha (x86) release "Kiwi en C" (Oct 31 2014 13:30:06)...
View ArticlePar : gentilkiwi
C’est pourtant marqué : https://github.com/gentilkiwi/mimikatz/wiki/module-~-sekurlsa#minidump Tu veux utiliser le minidump avec une version de mimikatz différente de celle de l’architecture d’origine....
View ArticlePar : Liryc
Merci de ta réponse, Quoiqu’il en soit BRAVO pour ton travail, je pense que mon Pb vient du fait de la compilation sous VS 2013 qui est peut être par défaut en 32 bits….
View ArticlePar : How Attackers Extract Credentials (Hashes) From LSASS » AD Security
[…] ProcDump // Windows Sysinternals – here Mimikatz // Blog de Gentil Kiwi – here The Volatility Foundation // Homepage – here Vmss2core // VMWare Labs – here VMware […]
View ArticlePar : KRBTGT: Active Directory’s Domain Kerberos Account » AD Security
[…] in Las Vegas, NV in early August, Skip Duckwell & Benjamin Delpy spoke about a method (using mimikatz) to generate your own kerberos tickets (aka the Golden Ticket). Key to this is that you...
View ArticlePar : Jeff
Fantastic tool…. How would i be able to invoke the DLL to call and return the vales from c# any ideas???
View ArticlePar : Owning Networks and Evading Incident Response with PowerShell » Active...
[…] tools such as Metasploit (an attack toolkit that includes a backdoor named Meterpreter) and Mimikatz (a password dumper) worked well, but I was a paranoid attacker and was worried that running...
View ArticlePar : MS14-068: Vulnerability in (Active Directory) Kerberos Could Allow...
[…] Active Directory domain’s KRBTGT password hash (typically dumped from a Domain Controller). Mimikatz (English translated site) fully supports generating Golden […]
View ArticlePar : The Evolution of Protected Processes Part 1: Pass-the-Hash Mitigations...
[…] or secrets, as well as to create tokens based on those hashes. Additionally, researchers such as Gentil Kiwi have even discovered that LSASS contains plain-text passwords using reversible symmetric...
View ArticlePar : D
Hi i have a win8 laptop and passwords is not showing no more just the ntlm hash no plain text password
View ArticlePar : Exploiting MS14-068 Vulnerable Domain Controllers Successfully with the...
[…] this TGT has an invalid PAC signature since the DC didn’t generate it! Benjamin Delpy’s Mimikatz presentation at Passwords 2014 describes the MS14-068 exploit (slide below extracted from his […]
View ArticlePar : День взлома публичных терминалов. |Бредоблог
[…] )) не мог до сих пор. Сегодня наткнулся на программу mimikatz, с которой легко можно узнать пасс админа )) как-то […]
View ArticlePar : 抓取windows密码的神器mimikatz | linux爱好者
[…] 下载地址:http://blog.gentilkiwi.com/mimikatz 本站备份:mimikatz 国人编译版本:GetPassword_x64 […]
View ArticlePar : 12 Days of HaXmas: MS14-068, now in Metasploit! | IT Security News
[…] v ##’ http://blog.gentilkiwi.com/mimikatz […]
View ArticlePar : maurice
La commande : sekurlsa::longonpasswords a comme résultat: ERROR mimikatz_doLocal ; « logonPasswords » command of « sekurlsa » module not found!
View ArticlePar : Attackers Can Now Use Mimikatz to Implant Skeleton Key on Domain...
[…] implanting the skeleton key remotely using Mimikatz the following events are logged on the Domain Controller. Event Id 4673 Sensitive Privilege […]
View ArticlePar : Ian
When i attempt to load the CNG service on Windows 8.1, i get a nice error. ERROR kull_m_patch_genericProcessOrServiceFromBuild ; kull_m_patch (0x00000000) I’ve got no AV running, or anything. Any ideas?
View Article