Commands
Popular Commands
List/Export Certificates
CRYPTO::CertificatesCreate Golden/Silver/Trust Tickets
KERBEROS::GoldenList All User Tickets (TGT and TGS) in User Memory
No special privileges required since it only displays the current user's tickets. Similar to functionality of "klist"
KERBEROS::ListPass The Ticket
Typically used to inject a stolen or forged Kerberos ticket (golden/silver/trust)
KERBEROS::PTTAsk a DC to Synchronize an Object (Get Password Data for Account)
No need to run code on the DC
LSADUMP::DCSyncAsk LSA Server to Retrieve SAM/AD Enterprise
Use to dump all Active Directory domain credentials from a Domain Controller or lsass.dmp dump file. Also used to get specific account credentials such as krbtgt with the parameter /name:krbtgt
Get the SysKey to Decrypt SAM Entries From Registry or Hive
The SAM option connects to the local Security Account Manager (SAM) database and dumps credentials for local accounts. This is used to dump all local credentials on a Windows computer
Ask LSA Server to Retrieve Trust Auth Information
Dumps trust keys (passwords) for all associated trusts (domain/forest)
Add to SIDHistory to User Account
The first value is the target account and the second value is the account/group names or SID. Moved to SID:Modify as of May 6th 2016.
Inject Skeleton Key into LSASS Process on Domain Controller
This enables all user authentication to the Skeleton Key patched DC to use a "master password" (aka Skeleton Keys) as well as their usual password
Get Debug Rights
This or Local System rights is required for many Mimikatz commands
List Kerberos Encryption Keys
List Kerberos Credential for All Authenticated Users
Get Domain Kerberos Service Account (KRBTGT) Password Data
List All Available Provider Credentials
This usually shows recently logged on user and computer credentials
Pass the Hash and OverPass the Hash
List All Available Kerberos Tickets for Recently Authenticated Users
Lists all available Kerberos tickets for all recently authenticated users, including services running under the context of a user account and the local computer's AD computer account. Unlike kerberos::list, sekurlsa uses memory reading and is not subject to key export restrictions. Serkurlsa can access tickets of other sessions (users).
List all Tokens of the System
Impersonate a Token
Used to elevate permissions to SYSTEM(default) or find a domain admin token on the box.
Impersonate a token with Domain Admin credentials
Last updated