Names | Mimikatz | |
Category | Tools | |
Type | Credential stealer, Keylogger | |
Description | (SANS) Mimikatz provides a wealth of tools for collecting and making use of Windows credentials on target systems, including retrieval of cleartext passwords, Lan Manager hashes, and NTLM hashes, certificates, and Kerberos tickets. The tools run with varying success on all versions of Windows from XP forward, with functionality somewhat limited in Windows 8.1 and later. | |
Information | <https://github.com/gentilkiwi/mimikatz> <https://www.sans.org/reading-room/whitepapers/intrusion/mimikatz-overview-defenses-detection-36780> <https://www.wired.com/story/how-mimikatz-became-go-to-hacker-tool/> <https://www.crowdstrike.com/blog/credential-theft-mimikatz-techniques/> | |
MITRE ATT&CK | <https://attack.mitre.org/software/S0002/> | |
Malpedia | <https://malpedia.caad.fkie.fraunhofer.de/details/win.mimikatz> | |
AlienVault OTX | <https://otx.alienvault.com/browse/pulses?q=tag:mimikatz> |
Last change to this tool card: 14 May 2020
Download this tool card in JSON format
60 groups listed (58 APT, 2 other, 0 unknown)
Digital Service Security Center Follow us on |
Report incidents |
|
+66 (0)2-123-1227 | ||
[email protected] |