mimikatz
for the saved logon password
If the password is null
DPAPI
to get the master key
getting creds after getting master key
Extracting Tickets from Memory with Mimikatz
Preparing the Base64 Blob for Cracking
Placing the Output into a File as .kirbi
Next, we can use this version of the kirbi2john.py
tool to extract the Kerberos ticket from the TGS file.
Extracting the Kerberos Ticket using kirbi2john.py
This will create a file called crack_file
. We then must modify the file a bit to be able to use Hashcat against the hash.
Modifying crack_file for Hashcat
Cracking the Hash with Hashcat
Infinite issue
use a non-interactive way
SAM Dump
Last updated