In addition to other functionality, Mimikatz extracts password hashes and clear-text credentials from system memory. Mimikatz can also manipulate domain account passwords or display protected credentials stored in files.
Would you like to be able to see clear text credentials stored in memory? How about harvesting clear text credentials stored in protected files? In this course, Credential Access with Mimikatz, you will learn how to leverage the advanced credential access capabilities of the open-source Mimikatz project towards post-exploitation activities. First, you will see how to harvest password hashes and clear text user names and passwords for active login sessions stored in system memory. Next, you will discover how Mimikatz can be used to open memory dumps from other systems for situations where you may not be able to run Mimikatz on the victim machine. Finally, you will explore how to obtain clear text usernames and passwords stored by browsers, changing domain user passwords on the fly, and capturing passwords to file. When you finished with this course, you will have the skills and knowledge of the open-source Mimikatz tool needed to emulate credential access techniques aligned with Mitre ATT&CK.
Tool Introduction Hi there, and welcome to Pluralsight and this cybersecurity tools course featuring Mimikatz, the open source, post exploitation tool developed and maintained by Benjamin Delpy. There are situations where clear text credential sets can be harvested from compromised systems. Along with other capabilities, Mimikatz can be used to extract password hashes and clear text credentials from memory. It can also be used to manipulate domain account passwords and to display protected credentials stored in certain files. These credentials can then be used to attack other systems on the network. If you are seeking to learn how Mimikatz can be used to obtain clear text credential sets during security engagements, or if you just want to learn how attackers are able to perform these activities, come join me, and learn how to harvest credentials using Mimikatz, here at Pluralsight.