View and save Windows OS credentials, including passwords, hash dumps, PIN codes, and kerberos tickets, with Mimikatz, an open-source utility used by penetration testers and cybercriminals.
Mimikatz is an open-source utility that enables viewing and saving Windows operating system credentials. Developed by Benjamin Delpy, it is designed to extract plaintext passwords, hash dumps, PIN codes, and kerberos tickets from memory.
Mimikatz works by directly accessing the memory of the Windows LSASS (Local Security Authority Subsystem Service) process. This allows it to obtain sensitive credential data that is otherwise not accessible through standard Windows APIs. Once launched, Mimikatz includes several commands such as:
Due to its capability to access protected memory and export security credentials, Mimikatz is mainly used by penetration testers and cybercriminals. Penetration testers can use it to demonstrate the risk of credential theft attacks. However cybercriminal groups often abuse it to perform lateral movement, privilege escalation, and pass-the-hash attacks across compromised Windows environments.
Here are some alternatives to Mimikatz:
Suggest an alternative ❐