Mimikatz is an open-source utility that enables viewing and saving Windows OS credentials. It can obtain passwords, hash dumps, PIN codes, and kerberos tickets from memory. It is mainly used by penetration testers and cybercriminals.
View and save Windows OS credentials, including passwords, hash dumps, PIN codes, and kerberos tickets, with Mimikatz, an open-source utility used by penetration testers and cybercriminals.
What is Mimikatz?
Mimikatz is an open-source utility that enables viewing and saving Windows operating system credentials. Developed by Benjamin Delpy, it is designed to extract plaintext passwords, hash dumps, PIN codes, and kerberos tickets from memory.
Mimikatz works by directly accessing the memory of the Windows LSASS (Local Security Authority Subsystem Service) process. This allows it to obtain sensitive credential data that is otherwise not accessible through standard Windows APIs. Once launched, Mimikatz includes several commands such as:
sekurlsa::logonPasswords - dump plaintext passwords and hashes of logged-on users
sekurlsa::msk - retrieve the computer's service account passwords
sekurlsa::tickets - export kerberos tickets to injectable .kirbi files
crypto::capi - export private certificate keys
token::elevate - get SYSTEM privileges
Due to its capability to access protected memory and export security credentials, Mimikatz is mainly used by penetration testers and cybercriminals. Penetration testers can use it to demonstrate the risk of credential theft attacks. However cybercriminal groups often abuse it to perform lateral movement, privilege escalation, and pass-the-hash attacks across compromised Windows environments.
Mimikatz Features
Features
Extracts plaintext passwords, hash dumps, PIN codes, and kerberos tickets from memory
Can perform pass-the-hash attacks
Can perform pass-the-ticket attacks
Can perform Over-Pass-the-Hash attacks
Can export security certificates
Can perform privilege escalation and lateral movement
Pricing
Open Source
Pros
Very effective at extracting credentials from memory
Useful for penetration testing engagements
Open source and free
Cons
Mainly used for malicious purposes by cybercriminals
Metasploit is an open source penetration testing framework used by cybersecurity professionals to test the security of an organization's networks and applications. It enables ethical hackers and security teams to identify potential weaknesses and vulnerabilities in a system before they are exploited by malicious actors.Some key features of Metasploit include:Database...
Cobalt Strike is a commercial software platform for Adversary Simulations and Red Team Operations. It provides penetration testers network situational awareness, access to credentials and internal network access, and the ability to mimic the techniques and procedures of advanced threats through its robust scripting engine.Key features of Cobalt Strike include:Beacon...
ZoomEye is a search engine and data mining tool for cyberspace that facilitates the discovery and analysis of devices exposed to the public internet. It functions like a search engine for cyberspace, allowing users to easily search for information on IPs, websites, and other devices.Some key features of ZoomEye include:Search...
Pentest-Tools.com is a free online platform that provides penetration testers and network security professionals with various utilities for auditing and exploiting vulnerabilities in networks and systems. It offers a wide range of tools including:Port scanners like Nmap to detect open ports and services on servers and devicesVulnerability scanners such as...
The Social-Engineer Toolkit (SET) is an open-source penetration testing framework designed specifically for simulating social engineering attacks. Developed by TrustedSec, SET is intended to be used legally and ethically by security researchers, consultants, red teams, and other IT professionals to test human elements in cybersecurity.SET includes a number of custom...
Nexpose is a comprehensive vulnerability management and penetration testing software developed and maintained by Rapid7. It enables organizations to identify security weaknesses across their networks, systems, web applications, databases, and endpoints.Key features of Nexpose include:Asset discovery - Automatically discovers devices, ports, services, vulnerabilities, and misconfigurations on the network.Risk-based vulnerability management...
Mageni is an open-source low-code application development platform focused on empowering businesses to build their own internal web applications. It features a visual, drag-and-drop interface that enables staff with no prior coding experience to rapidly develop custom apps that automate workflows, manage data, and streamline business processes.Some key capabilities and...
Sn1per Professional is an advanced automated vulnerability scanner used for penetration testing and network security assessments. It is designed to provide comprehensive scanning capabilities to rapidly find security vulnerabilities in web applications, servers, and networks.Key features of Sn1per Professional include:Automated discovery and scanning of web apps, servers, and network devicesHundreds...
Immunity CANVAS is a comprehensive penetration testing platform used to simulate real-world cyber attacks against infrastructure and applications. It helps security professionals and red teams identify weaknesses before attackers can exploit them.Key features of Immunity CANVAS include:Hundreds of exploit modules for testing vulnerabilities across operating systems, network devices, web apps,...
Core Impact Pro is a comprehensive penetration testing software used by information security teams to perform automated attacks against their organizations' networks, endpoints, web applications, wireless networks, mobile devices, and more. It can help identify vulnerabilities and provide remediation advice before cybercriminals have a chance to exploit them.Key features of...
BloodHound is an open source security software used to analyze Active Directory environments to find relationships and paths between different Active Directory objects and identify potential ways for an attacker to escalate privileges and move laterally within the network.It uses graph theory to analyze the extracted data, map out the...
Exploit Pack is an automated penetration testing tool used to help security professionals and web administrators evaluate the security of networks, web applications, databases, and computer systems. It simulates cyber attacks by leveraging known software vulnerabilities and misconfigurations.The tool contains hundreds of exploits and payloads that can be launched individually...
BabySploit is an open-source penetration testing framework and toolkit that allows beginners to get started with ethical hacking and cybersecurity education. It provides a simple graphical user interface along with a collection of basic network scanning and exploitation tools without the complexity of advanced frameworks like Metasploit.Key features of BabySploit...
Andspoilt is an open-source app for Android that helps users declutter and better organize the apps on their phone. It works by analyzing app usage data on the device and flagging apps that have not been opened in a long time or are rarely used. Users can then easily uninstall,...