Skip to main content
JG is here with you โœจ

Mimikatz

Windows Credential Extraction - Post-Exploitation & Lateral Movement

red Team Operation

What is Mimikatz?

Mimikatz is a post-exploitation tool that extracts plaintext passwords, hashes, PIN codes, and Kerberos tickets from Windows memory. Created by Benjamin Delpy, it's become essential for security testing and understanding Windows authentication weaknesses.

Mimikatz exploits Windows authentication protocols (NTLM, Kerberos) and credential caching mechanisms. It requires administrative privileges to access LSASS (Local Security Authority Subsystem Service) memory where credentials are stored.

Core Capabilities

๐Ÿ”‘ Password Extraction

Extract plaintext passwords and NTLM hashes from LSASS memory

๐ŸŽซ Kerberos Tickets

Dump and manipulate Kerberos TGTs and service tickets

๐Ÿ‘‘ Golden Ticket

Create forged Kerberos TGTs for domain persistence

๐ŸŽŸ๏ธ Silver Ticket

Forge service tickets for specific services

๐Ÿ”„ Pass-the-Hash

Authenticate using NTLM hash without knowing plaintext password

๐ŸŽช Pass-the-Ticket

Import stolen Kerberos tickets for impersonation

Attack Techniques

sekurlsa::logonpasswords

Dumps all credentials from LSASS memory including passwords, hashes, and Kerberos keys.

Most common and powerful Mimikatz command

kerberos::golden

Creates Golden Tickets using the krbtgt account hash for complete domain control.

Requires krbtgt hash (Domain Admin access)

sekurlsa::pth

Pass-the-Hash attack - spawns process with hash authentication without cracking password.

Enables lateral movement with stolen hashes

Blue Team Defense Strategies

1. Credential Guard

Enable Windows Credential Guard (virtualization-based security) to protect LSASS

2. LSA Protection

Enable LSA (RunAsPPL) to prevent non-protected processes from accessing LSASS memory

3. Privileged Access Workstations

Use dedicated PAWs for administrative tasks, never browse internet or read email on admin systems

4. Tiered Administration

Implement tier 0/1/2 model, prevent credential caching on lower tiers

5. Disable WDigest

Disable WDigest authentication (stores plaintext passwords) on Windows systems

6. Monitor LSASS Access

Alert on unusual LSASS access, process injection, or suspicious memory reads

Detection Indicators

LSASS Memory Access: Unusual processes reading LSASS.exe memory (PID typically 500-700)

Mimikatz Strings: File or memory contains strings like "sekurlsa", "kerberos::golden", "gentilkiwi"

Process Injection: CreateRemoteThread or similar injection techniques targeting LSASS

Event ID 4688: Process creation with suspicious command line (e.g., "privilege::debug")

Event ID 10: Sysmon logs showing OpenProcess on LSASS with suspicious source process

๐Ÿ›ก๏ธ Blue Team Testing Value

Understanding Mimikatz helps Blue Teams secure Windows environments and detect credential theft:

  • โœ“Test if Credential Guard and LSA Protection are properly enabled
  • โœ“Validate EDR/AV detection of Mimikatz execution and variants
  • โœ“Audit credential caching policies and privileged account exposure
  • โœ“Verify monitoring detects LSASS memory access and suspicious behavior
  • โœ“Practice incident response to credential compromise scenarios

๐Ÿ–ฅ๏ธ Desktop Experience Available

The interactive Mimikatz simulation lab is available on desktop devices. Switch to a larger screen to practice credential extraction techniques, understand Windows authentication attacks, and learn defensive countermeasures.

Open to AI-Focused Roles

AI Sales โ€ข AI Strategy โ€ข AI Success โ€ข Creative Tech โ€ข Toronto / Remote

Let's connect โ†’
Terms of ServiceLicense AgreementPrivacy Policy
Copyright ยฉ 2026 JMFG. All rights reserved.