一、mimikatz简介: mimikatz常用于获取windows系统明文密码、系统账号hash、浏览器密码、VPN(ADSL)密码、RDP终端密码等,在内网横向渗透中可用于各种凭证的导入导出,包括大家熟悉的hash传递攻击。 程序的发布主页:http://blog.gentilkiwi.com/mimikatz 下载地址:https://github.com/gentilkiwi/mimikatz/releases 二、基础用...
本文主要是记录内网渗透神器mimikatz的主要使用方法,作为今后在渗透过程中的一个简单手册。 1. 工具简介 项目地址:github.com/gentilkiwi/m 作者一直在更新这个项目,截止今日,最近一次更新2021年8月10日。 mimikatz可以从内存中提取明文密码、哈希、PIN 码和kerberos 票证。 mimikatz 还可以执行哈希传递、票证传递或构建...
A little tool to play with Windows security. Contribute to gentilkiwi/mimikatz development by creating an account on GitHub.
SVN URL is :https://github.com/gentilkiwi/mimikatz/trunk ZIP file is :https://github.com/gentilkiwi/mimikatz/archive/master.zip After opening the solution,Build/Build Solution(you can change architecture) mimikatzis now built and ready to be used! (Win32/x64evenARM64if you're lucky) ...
SVN URL is :https://github.com/gentilkiwi/mimikatz/trunk ZIP file is :https://github.com/gentilkiwi/mimikatz/archive/master.zip After opening the solution,Build/Build Solution(you can change architecture) mimikatzis now built and ready to be used! (Win32/x64evenARM64if you're lucky) ...
A little tool to play with Windows security. Contribute to gentilkiwi/mimikatz development by creating an account on GitHub.
下载地址:github.com/gentilkiwi/m 1、开启mimikatz。以管理员权限打开cmd,进入mimikatz相应操作系统的目录下,输入命令: mimikatz.exe 2、提升权限,输入命令: privilege::debug (如果出现以下报错:ERROR kuhl_m_privilege_simple ; RtlAdjustPrivilege (20) c0000061 说明你不是管理员权限) 3、权限提升至 NT AUTHO...
GIT URL is : https://github.com/gentilkiwi/mimikatz.git SVN URL is : https://github.com/gentilkiwi/mimikatz/trunkBuild the solutionAfter opening the solution, Build / Build Solution (you can change architecture) mimikatz is now built and ready to be used! (Win32 / x64)...
一、软件介绍 一款获取windows账号密码的软件 二、下载地址(软件作者) https://github.com/gentilkiwi/mimikatz 三、使用方法 1、解压后双击打开,分32位和64位 2、输入下面两行命令,直接获取密码 privilege::debug sekurlsa::logonpasswords 禁止非法,后果自负...
A little tool to play with Windows security. Contribute to gentilkiwi/mimikatz development by creating an account on GitHub.