How to do it...

Let's perform the following steps:

  1. Once we have the Meterpreter and system privileges, we can load up Mimikatz using the following command:
load mimikatz
  1. To view all of the available options, type the following command:
help mimikatz

The output of running the preceding command can be seen in the following screenshot:

  1. Now, to retrieve passwords from memory, we will use the built-in msv command of Metasploit:
msv

The output of running the preceding command can be seen in the following screenshot:

  1. We can see that the NT LAN Manager (NTLM) has been shown on screen. To view Kerberos credentials, type in the following command:
kerberos

The output of running the preceding command can be seen in the following screenshot:

If there were any credentials, they would have been shown in the preceding screenshot.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.129.67.26